First page Back Continue Last page Summary Graphics
CGI-Bin Exploit
Protection
- Use shadow password file
- Dont run web applications as root or admin
- Code review and test CGI scripts to see if you can shell out or access other files
- Keep your systems and applications up to date
- Use host vulnerability scanners to ensure that web servers are reasonably secure