Web Server Through the Eyes of a Hacker

Aleksandr Shitik
Aleksandr Shitik

I write my own posts and books, and review movies and books. Expert in cosmology and astronomy, IT, productivity, and planning.

Web Server Through the Eyes of a Hacker
Mikhail Flenov
Genres: Programming
Year of publication: 2021
Year of reading: 2025
My rating: Good
Number of reads: 1
Total pages: 257
Summary (pages): 15
Original language of publication: Russian
Translations to other languages: No translations to other languages found

General Overview

The book is about 250 pages long and consists of 10 chapters. It contains many code snippets and images. The reading difficulty level is light/medium.

Short Description

Let’s briefly review the book’s chapters.

Chapter 1. Fundamentals of Security.

Security fundamentals are briefly covered — from social engineering to DDoS attacks.

Chapter 2. Simple Hacking Methods.

Examples of building a proper voting system are presented, including the use of captcha.

Chapter 3. Hacking PHP Scripts.

Ways to hack PHP when receiving and processing URL parameters on the server are discussed. Other methods are also covered.

Chapter 4. Working with System Commands.

System command calls are explained. The topic of working with files (e.g., uploading to a server) is also touched upon.

Chapter 5. SQL Injection (PHP + MySQL).

Vulnerabilities in the browser’s URL bar and forms that are poorly filtered and processed are examined.

Chapter 6. SQL Injection (.NET + MS SQL Server).

Essentially the same, but applied to C#.

Chapter 7. CSRF, or XSRF Vulnerability.

The title speaks for itself: cross‑site attacks and ways to defend against them are examined.

Chapter 8. DoS Attack on a Website.

Distributed attacks aimed at exhausting system resources are described. Examples of web and server weak points are analyzed.

Chapter 9. Authorization.

Various simple authorization methods — from cookies to sessions — are examined, and the weaknesses of each approach are described.

Chapter 10. XSS.

It’s about intercepting data using JavaScript.

Opinion

By this point I had already read a dozen books on security and ways to attack and protect web servers and sites. With each new book the amount of new useful information for me dwindles, as the topics are the same, often treated superficially, and few people want to dive deeper and write detailed books on specific aspects.

Nevertheless, this book periodically fed me new information, and after finishing it I ended up with a 15‑page summary. That speaks to the book’s value even for me.

More broadly, without tying it to me personally, if you want to delve into information‑security topics and are not yet an expert, I definitely recommend this book for reading.

This text is exclusively a review of the book and is not a recommendation. The tools and methods described in the book are presented solely for informational purposes — this does not constitute a call to action on my part. Moreover, some technologies or practices may be restricted, blocked, or illegal in certain countries, and each individual should evaluate their use independently, considering local legislation and personal responsibility.

Вверх