Web Applications and Data Servers provides an overview of session hijacking, how to hack Web servers and database servers, as well as password-cracking techniques and Web application vulnerabilities.
Chapter 1, Session Hijacking, covers various hacking technologies used in session hijacking, including spoofing methods, the three-way TCP handshake, and how attackers use these methods for man-in-the-middle attacks.
Chapter 2, Hacking Web Servers, highlights the various security concerns having to do with Web servers including server bugs, malicious code, and network security.
Chapter 3, Web Application Vulnerabilities, shows the various kinds of vulnerabilities that can be discovered in Web applications, as well as attacks exploiting these vulnerabilities.
Chapter 4, Web-Based Password Cracking Techniques, explains the relationship between passwords and authentication and discusses passwords within the broader context of authentication.
Chapter 5, Hacking Web Browsers, provides an understanding of Web browsers, security of, and how to hack various browsers. The browsers discussed include Firefox, Internet Explorer, Opera, and Safari.
Chapter 6, SQL Injection, concentrates on SQL injection, how it works, and what administrators can do to prevent it.
Chapter 7, Hacking Database Servers, provides an understanding on how database servers are hacked including a discussion of Oracle database and SQL servers.