Vulnerability Assessment and Penetration Testing in Web Application and Its Prevention

Authors

  • Nidhi Vora  Research Scholar, IT and Telecommunication Department, Raksha Shakti University, Gujarat, India
  • Chandresh Parekh  Assistant Professor, IT and Telecommunication Department, Raksha Shakti University, Gujarat, India

Keywords:

Cyber security, Vulnerability assessment, penetration testing, web attacks.

Abstract

Utilization of PCs are expanding step by step, System's intricacy is expanding, most of the frameworks are associated with the web. As the Use of more web t like online networking sites, distributed computing we have to secure web application. Utilization of more web that prompts an ever-increasing number of vulnerabilities in framework. Assailants, use their vulnerabilities to misuse the casualty's framework. As a security reason we need to discover these vulnerabilities ahead of time before aggressor do. To keep this issue one arrangement was recommended named weakness evaluation and infiltration testing for security of web application. Powerlessness evaluation is the source by which we can discover blame in the framework. The capacity of infiltration testing is the recognize the vulnerabilities and we can get access into site and system as unapproved client and discovering escape clauses. Because of these vulnerabilities quantities of frameworks are misuse each year. Helpless sites, system or framework might be bargained by different assaults, for example, DDos(Distributed Denial of service)attack, DNS(Domain name server)Spoofing, DHCP(Dynamic Host Configuration Protocol)snooping, ARP(Address Resolution Protocol)Poisoning, Smurf assaults, Man-in-the-Middle, Buffer flood, SQL infusion and numerous other digital assaults alongside various noxious digital assaults containing numerous malware, for example, infections, Trojan Horse, Worms, Rootkits, spyware and adware, botnet and so forth. These vulnerabilities principle explanation for this is week passwords, programming bugs, don't utilize refreshed frameworks, non-fixing of working frameworks. Content code infusion spaces and so on. The primary goals of this paper are discovering vulnerabilities from sites and give aversion remediation.

References

  1. Ankita Gupta, Kavita, Kirandeep Kaur. "Vulnerability Assessment and Penetration Testing". International Journal of Engineering Trends and Technology (IJETT). V4(3):328-333 Mar 2013.
  2. A Modern Approach to Cyber Security Analysis Using. Vulnerability Assessment and Penetration Testing. Sugandh Shah SEP-2013
  3. Vulnerability Assessment and Penetration Testing used for Cyber Security. Authors: Shreeyash Bothare, Parth Sagar,Vol 2, No 1 (2017)
  4. Penetration Testing and vulnerability assessment, Irfan Yaqoob, Syed Adil Hussain, Saqib Mamoon, Nouman Naseer, Jazeb Akram, Anees ur Rehman University of the Punjab, Jhelum Campus, Pakistan 6 University of Engineering and Technology, Lahore, Pakistan
  5. Kumar, K. Srinivasa Rao, A. Latest Approach to Cyber Security. Analysis using. Vulnerability. Assessment and Penetration Testing, International Journal of Emerging.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Nidhi Vora, Chandresh Parekh, " Vulnerability Assessment and Penetration Testing in Web Application and Its Prevention, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.731-736, November-December-2017.