Hi,
keydet89 rightly said.
Pay attention in the error 500(server error) also, Attacker used to send false request to the server and complete database architectures could be cloned from the error message responded by your server.
Extract all false requests and test the same with setup (host setup in virtual testbed) for your knowledge. Analyze the results and you feel the diffs.
Tools: MS Excel with filter options, Textpad, Notepad++ and simple batch file with find command in windows
good luck
regards
babu
↧