An Introduction

Prerequisites:

Foundation:

  • DNS is a convention within the guidelines for how PCs trade information on the Internet and on numerous private organizations, known as the TCP/IP convention suite. A DNS service is utilized for routing the domain name of websites with its IP address. A DNS mainframe deals with an enormous information base that maps domain names to IP addresses.


Set — 2

Hackers can make different sorts of harm, exploits an association by hacking web servers. A hacker can utilize numerous procedures to exploit or harm a web server, for example, DoS/DDoS, DNS server amplification, XSS, sniffing, phishing, web server misconfiguration, HTTP reaction parting, web reserve harming, SSH brute force, web server secret key breaking, etc.

Types of Web Server Attacks:

  • DoS/DDoS Attacks: A DoS/DDoS attack involves flooding targets with numerous fake requests so that the target stops functioning and will be unbelievable to legitimate users. Using a web server DoS/DDoS attack, an attacker attempts to take the webserver down or make…


Set -1

Most organizations believe their web presence to be an expansion of themselves. Associations make their web presence on the World Wide Web utilizing websites related to their organizations. Web servers are a basic part of the web framework. A solitary weakness in web server arrangement may prompt security to penetrate on websites. This makes web server security basic to the typical working of an association. A web server is a PC framework that stores, cycles, and conveys web pages to worldwide customers by means of HTTP convention. All in all, a customer starts the correspondence cycle through HTTP demands.

Components…


Attribution is the way toward setting up who is behind a hack. Regularly, attribution is the most troublesome piece of reacting to a significant break since experienced hackers may take cover behind layers of online services, etc. that veil their actual area and personality. Cyber attribution is the way toward following, distinguishing, and laying fault on the culprit of a cyber-attack or other hacking abuse.

Cyber attacks can have genuine ramifications for organizations as far as advertising, consistency, notoriety, and accounts, etc. In the wake of an attack, an organization regularly leads various audits, tests to credit the episode to…

Shivay Sabharwal

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store