[go: up one dir, main page]

Bhatia et al., 2021 - Google Patents

Vulnerability Assessment and Penetration Testing

Bhatia et al., 2021

View PDF
Document ID
15496159464078148752
Author
Bhatia G
Bhatia O
Bhandare A
Bagde V
Prayagkar A
Publication year
Publication venue
International Journal of Engineering Research & Technology (IJERT)

External Links

Snippet

This paper describes about the technical ap-proach for manual web-app penetration testing for maintaining the security of the web applications. We will also look for OWASP top 10 vulnerabilities in detail and its exploitation. It also contains some courses that anyone can do …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Alwan et al. Detection and prevention of SQL injection attack: a survey
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
Djeki et al. Preventive measures for digital learning spaces’ security issues
Lepofsky The manager's guide to web application security: a concise guide to the weaker side of the web
Odirichukwu et al. Security concept in web database development and administration—A review perspective
Dhiman et al. Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
Bhatia et al. Vulnerability Assessment and Penetration Testing
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Čović Threats and Vulnerabilities in Web Applications and How to Avoid Them
Khamdamov et al. Method of developing a web-application firewall
Shakya et al. Concerns on Information System and Security Audit
MEHARU WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING)
Axinte SQL injection testing in web applications using SQLmap
Bissyandé et al. Vulnerabilities of government websites in a developing country–the case of Burkina Faso
Patil et al. A Review of the OW ASP Top 10 Web Application Security Risks and Best Practices for Mitigating These Risks
Sharp Software security
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Karakaya et al. A survey of cyber-threats for the security of institutions
Khan et al. Cybersecurity attacks: Common vulnerabilities in the critical infrastructure
Jøsang Cybersecurity
Hossain et al. The pros and cons of modern web application security flaws and possible solutions
Fgee et al. My Security for Dynamic Websites in Educational Institution
Serrhini et al. Improve security of web Browser with stand-alone e-Learning awareness application
Awang et al. A survey on conducting vulnerability assessment in web-based application
Nikolov et al. Threat modeling based on STRIDE framework for web application