Please use this identifier to cite or link to this item:
https://idr.nitk.ac.in/jspui/handle/123456789/15160
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh N. | |
dc.contributor.author | Meherhomji V. | |
dc.contributor.author | Chandavarkar B.R. | |
dc.date.accessioned | 2021-05-05T10:16:36Z | - |
dc.date.available | 2021-05-05T10:16:36Z | - |
dc.date.issued | 2020 | |
dc.identifier.citation | 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. - | en_US |
dc.identifier.uri | https://doi.org/10.1109/ICCCNT49239.2020.9225385 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/15160 | - |
dc.description.abstract | The main aim of this work is to find and explain certain scenarios that can demonstrate the differences in automated and manual approaches for penetration testing. There are some scenarios in which manual testing works better than automatic scripts/vulnerability scanners for finding security issues in web applications. In some other scenarios, the opposite may be true. The concepts of various web application vulnerabilities have been used for testing, including OWASP1Open Web Application Security Project; online community dedicated to web security Top 10, using both manual and automatic approaches. Automation tools and scripts have been used and tested to see what could potentially go wrong if attackers exploit such vulnerabilities. Also, certain scenarios have been used which determine whether one approach is better than the other for finding/detecting security issues in web applications. Finally, the work concludes by providing results in the form of pros-and-cons of both approaches, which it realises after carrying this out. © 2020 IEEE. | en_US |
dc.title | Automated versus Manual Approach of Web Application Penetration Testing | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.