Look up a web attack online and write a report on the process of  a method used to disabling a weak web server.