• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Wk# 12: Reading Discussions

November 17, 2020 by Mei X Wang Leave a Comment

XML Web Services Security and Web-based Application Security

  • XML web services operate over standard protocols/technologies
    • XML, HTTP, TCP/IP, SMTP
    • De Facto today is HTTP protocol
  • Web-based services: vulnerabilities within infrastructure
    • ex. web application published, the entire world is invited to send HTTP requests
    • attacks can be buried and past firewalls/filters/platform/intrusion detection
    • Defenses used can be parameter validation on
      • The data type (string, integer, real, etc) ·
      • Allowable character set
      • Minimum and maximum length
      • Whether a null is allowed or not
      • Whether the parameter is required or not
      • Whether duplicates are allowed
      • Numeric ranges · enumerated values · specific patterns
      • etc

Discussion  Questions:

  1. What web-based services do you use most commonly in your day-to-day operations?
  2. Have you encountered a situation where a web-based vulnerability were exploited?

Filed Under: Week 12: Introduction to Wireless Security with WEP and WPA2 PSK Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in