Summary
In this chapter, we looked at how web servers are compromised and some of the different attacks that can be leveraged against them. We covered different types of web servers, IIS and Apache, and vulnerabilities that can be introduced just by the underlying operating system. We also discussed authentication attacks, as well as other types of attacks that take place against web servers.
Web servers and the components they support make for a complex environment that can be difficult to support. However, with some of the information presented in this chapter, you have a foundation to better understand where insecurities are introduced and how you might go about protecting the server.
In the next chapter, we will look at databases and attacks that can be leveraged against them. This will include attacks at the operating system level, as well as vulnerabilities introduced through application interfaces.