How can a computer criminal use HTTP methods before running an exploit on a server?

What will be an ideal response?


If you know HTTP methods, you can send a request to a Web server and, from the generated output, determine what OS the Web server is using. You can also find other information that could be used in an attack. After you determine which OS version a company is running, you can search for any exploits that might be used against that network's systems.

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Windows is a non-preemptive multitasking, multithreaded operating system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following would meet the requirements for multifactor authentication?

A. Username, PIN, and employee ID number B. Fingerprint and password C. Smart card and hardware token D. Voice recognition and retina scan

Computer Science & Information Technology

To move focus to a specific form item, use the ______ built-in subprogram.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology