Steps in a hacking investigation. Logging of web servers. Log analysis tools and techniques. General indications of suspicious activity. Vulnerability scans. Circumvention attacks. Session attacks. Injection attacks. Denial of service attacks. Web server attack scans and an introduction to malware scanning. Application exercises.