Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software. Other web servers – These include Novell’s Web Server and IBM’s Lotus Domino servers.ĭirectory traversal attacks– This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain.
Apache Tomcat – Most Java server pages (JSP) websites are hosted on this type of web server.Most asp and aspx websites are hosted on IIS servers. It runs on Windows and is the second most used web server on the internet. Internet Information Services (IIS)– It is developed by Microsoft.Most PHP websites are hosted on Apache servers. It is cross platform but is it’s usually installed on Linux. Apache– This is the commonly used web server on the internet.The following is a list of the common web servers
HACK LITESPEED WEB SERVER SOFTWARE
Lack of security policy and procedures– lack of a security policy and procedures such as updating antivirus software, patching the operating system and web server software can create security loop holes for attackers.In additional to the above-mentioned web server vulnerabilities, the following can also led to unauthorized access Bugs in the operating system and web servers– discovered bugs in the operating system or web server software can also be exploited to gain unauthorized access to the system.