Fingerprinting Port 80 Attacks – This paper looks at some of the signatures that are used in web server attacks and what to look for in your logs.
You can download it from the following link: https://packetstormsecurity.com/files/download/25423/fingerprint-port80.txt
Source: https://packetstormsecurity.com/files/25423/fingerprint-port80.txt.html

