Detecting Web
Detecting Web
Detecting Web
net/publication/317937251
CITATIONS READS
2 1,872
2 authors, including:
Pandikumar Thangasamy
Defence University
28 PUBLICATIONS 42 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Pandikumar Thangasamy on 27 June 2017.
11 Phd, Department of Computer and Information Technology, Defence University, College of Engineering,
Debre Zeyit, Ethiopia
2 M-tech, Department of Computer and Information Technology, Defence University, College of Engineering,
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 430
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 10 | Oct -2016 www.irjet.net p-ISSN: 2395-0072
According to, following assumptions were made within vulnerabilities that could result from poor or improper
Tainted Mode Model: system configuration, either known and unknown
1. All data received from the client via HTTP-requests is hardware or software flaws, or operational weaknesses in
untrustworthy (or tainted). process or technical countermeasures. This analysis is
2. All data being local to the web application is carried out from the position of a potential attacker and
trustworthy (or untainted). can involve active exploitation of security vulnerabilities.
3. Any untrustworthy data can be made trustworthy by Penetration testing approach is based on simulation of
special kinds of processing, named sanitization with these attacks against web applications. Currently, penetration
assumptions made; security vulnerability is defined as a testing is implemented as black box testing. A vulnerability
violation of any of the following rules: assessment simply identifies and reports noted
1. Untrustworthy (tainted) data should not be used in vulnerabilities, whereas a penetration test attempts to
construction of HTTP responses. exploit the vulnerabilities to determine whether
This prevents cross site scripting attacks.
2. Untrustworthy (tainted) data should not be saved to
local storages. This prevents possible construction of
HTTP responses from these sources in future.
3. Untrustworthy (tainted) data should not be used in
system calls and in construction of commands to external
services such as database, mail, etc. This prevents most of
injection attacks.
4. Untrustworthy (tainted) data should not be used in
construction of commands that would be passed as input
to interpreter. This prevents script code injection attacks.
[2]
2. Dynamic Analysis Testing
A Dynamic analysis test communicates with a web unauthorized access or other malicious activity is possible.
application through the web front-end in order to identify Penetration testing typically includes application security
potential security vulnerabilities and architectural testing as well as controls and processes around the
weaknesses in the web application. Unlike source code applications.
scanners, a dynamic analysis program doesn't have access
to the source code and therefore detects vulnerabilities by
actually performing attacks.[2]
Figure 1: Visualization of vulnerability in the application
A dynamic analysis security scanner can facilitate the
[2]
automated detection of security vulnerabilities within a
web application. A dynamic analysis test is often required
to comply with various regulatory requirements. Dynamic 3.1 Conducting Penetration Testing
analysis scanners can look for a wide variety of Penetration testing is not merely the serial execution of
vulnerabilities, including: automated tools and generation of technical reports as it is
-Site Scripting, SQL frequently viewed. It should provide a clear and concise
Injection, etc.) direction on how to secure an organization’s information
and information systems from real world attacks.
lems One critical factor in the success of penetration testing is
its underlying methodology. A systematic and scientific
3. PENTETERATION TESTING approach should be used to successfully document a test
A penetration test, occasionally called as pen-test, is a and create reports that are aimed at different levels of
method of evaluating the security of a computer system or management within an organization. It should not be
network by simulating an attack from malicious outsiders restrictive to enable the tester to fully explore his
(who do not have an authorized means of accessing the intuitions.
organization's systems) and malicious insiders (who have Generally, penetration testing has three phases: test
some level of authorized access). The process involves an preparation, test, and test analysis as shown in Figure 2.
active analysis of the system for any potential
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 431
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 10 | Oct -2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 432
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 10 | Oct -2016 www.irjet.net p-ISSN: 2395-0072
BIOGRAPHIES
My name is Tseday Eshetu Belayneh
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 433