A survey on web application penetration testing

EA Altulaihan, A Alismail, M Frikha - Electronics, 2023 - mdpi.com
Websites are becoming increasingly effective communication tools. Nevertheless, web
applications are vulnerable to attack and can give attackers access to sensitive information …

Automated Penetration Testing, A Systematic Review

V Saber, D ElSayad, AM Bahaa-Eldin… - … Mobile, Intelligent, and …, 2023 - ieeexplore.ieee.org
Penetration testing (Pen-Testing) detects potential vulnerabilities and exploits by imitating
black hat hackers to stop cyber crimes. Despite recent attempts to automate Pen-Testing, the …

DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks

Z Liu, C Hu, C Shan, Z Peng - Information Sciences, 2023 - Elsevier
The existing researches point to a lack of studies addressing the quantitative evaluation of
the effectiveness of cyber defense. This difficult matter has been plaguing cyber security …

The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities

N Albalawi, N Alamrani, R Aloufi, M Albalawi, A Aljaedi… - Electronics, 2023 - mdpi.com
In recent years, the number of people using the Internet has increased worldwide, and the
use of web applications in many areas of daily life, such as education, healthcare, finance …

Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework

A Fadlil, I Riadi, MA Mu'min - International Journal of Engineering, 2024 - ije.ir
SQL injection (SQLi) is one of the most common attacks against database servers and has
the potential to threaten server services by utilizing SQL commands to change, delete, or …

Beyond the Basics: A Study of Advanced Techniques for Detecting and Preventing SQL Injection Attacks

A Goyal, P Matta - 2023 4th International Conference on Smart …, 2023 - ieeexplore.ieee.org
Attacks using SQL (Structured Query Language) injection pose a serious risk to the
confidentiality and integrity of databases and web applications. Although tried-and-true …

The Reliability Analysis for Information Security Metrics in Academic Environment

PD Ibnugraha, A Satria, FS Nagari, MF Rizal… - … : International Journal on …, 2023 - joiv.org
Today, academic institution involves digital data to support the educational process. It has
advantages, especially related to ease of access and process. However, security problems …

Cybersecurity Strengthening through Penetration Testing: Emerging Trends and Challenges

AK Mahamood, M Malik, AB Ruhani… - … Journal eISSN 2636 …, 2023 - majmuah.com
Penetration testing is an important tool for assessing system security posture and detecting
vulnerabilities. Cybersecurity risks, such as hacking and data breaches, have become …

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method

FP Utama, RMH Nurhadi - CommIT (Communication and …, 2024 - journal.binus.ac.id
The security of academic information systems needs consideration to anticipate various
threats, resulting in data leakage, misuse of information, modification, and data destruction …

Automated tools and techniques in vulnerability assessment

A Mohan, GA Swaminathan… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Penetration Testing in Ethical Hacking is one of the most efficient method used by high end
organizations to overcome this data threat caused by cyber criminals. Penetration Testing …