Bhatia et al., 2021 - Google Patents
Vulnerability Assessment and Penetration TestingBhatia et al., 2021
View PDF- Document ID
- 15496159464078148752
- Author
- Bhatia G
- Bhatia O
- Bhandare A
- Bagde V
- Prayagkar A
- Publication year
- Publication venue
- International Journal of Engineering Research & Technology (IJERT)
External Links
Snippet
This paper describes about the technical ap-proach for manual web-app penetration testing for maintaining the security of the web applications. We will also look for OWASP top 10 vulnerabilities in detail and its exploitation. It also contains some courses that anyone can do …
- 238000012360 testing method 0 title abstract description 37
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alwan et al. | Detection and prevention of SQL injection attack: a survey | |
Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
Djeki et al. | Preventive measures for digital learning spaces’ security issues | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Odirichukwu et al. | Security concept in web database development and administration—A review perspective | |
Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
Bhatia et al. | Vulnerability Assessment and Penetration Testing | |
Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
Čović | Threats and Vulnerabilities in Web Applications and How to Avoid Them | |
Khamdamov et al. | Method of developing a web-application firewall | |
Shakya et al. | Concerns on Information System and Security Audit | |
MEHARU | WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING) | |
Axinte | SQL injection testing in web applications using SQLmap | |
Bissyandé et al. | Vulnerabilities of government websites in a developing country–the case of Burkina Faso | |
Patil et al. | A Review of the OW ASP Top 10 Web Application Security Risks and Best Practices for Mitigating These Risks | |
Sharp | Software security | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
Karakaya et al. | A survey of cyber-threats for the security of institutions | |
Khan et al. | Cybersecurity attacks: Common vulnerabilities in the critical infrastructure | |
Jøsang | Cybersecurity | |
Hossain et al. | The pros and cons of modern web application security flaws and possible solutions | |
Fgee et al. | My Security for Dynamic Websites in Educational Institution | |
Serrhini et al. | Improve security of web Browser with stand-alone e-Learning awareness application | |
Awang et al. | A survey on conducting vulnerability assessment in web-based application | |
Nikolov et al. | Threat modeling based on STRIDE framework for web application |