CGISecurity Logo

Fingerprinting Port 80 Attacks 2: A look into web server, and web application attack signatures: Part Two.

Part two of "Fingerprinting port80 attacks". This paper provides information on web application
attack forensics that will help you identify what an attacker might be doing. Part two covers
attacks that where not mentioned in the first paper.

Fingerprinting Port80 Part 2 (TXT)
Fingerprinting Port80 Part 2 (HTML)