Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detailed view of threats, loop holes, bugs, back doors so that the it manger fix all these vulnerabilities and back doors will help to provide more security and better protection from malicious attacks. Vulnerabilities can be finding by in two ways, internal testing and external testing. Organization contact the third party vendors for pen-testing the whole organization, during the vapt some files may be altered. Vapt ensure that organization applications, web servers, database servers brought back to the initial state. Sql’s injections are in the top 10 attacks list published by owasp (open web application security project). Implementing manually sql’s injection to find the vulnerabilities on the web application and try to prevent these threats from exploitation.
Authors and Affiliations
Mohd Muneer Khan
Generation High Voltage: A Technique for Laboratory Educational Works
In this paper a method is discussed to generate high voltage DC up to 110kV using Cockroft-Walton Voltage Multiplier for study and research at educational laboratory. As High Voltage DC (HVDC) transmission is becoming m...
Intelligent Train Track Checker System
the paper depicts how to avoid railway accidents occurring because of breaks in tracks and collision of trains when on the same track, which can be because of humans, material weakness or natural calamities like floods,...
Preventing Private Information Inference Attacks on Online Social Networks
On-line social networks like Facebook are increasingly utilized by many people. These networks allow users to publish their own details and enable them to contact their friends. Some of the information revealed inside t...
Multi-Document Summarization Using K-Medoids Clustering Approach
Multi document summarization is the process of transforming a set of documents into a single summarized document. The summarized document can give overall idea of the document collection. Summarization of text document...
Case study based vendor selection by TOPSIS and Pugh Matrix approach
Manufacturing industries to succeed, supply chain has a key role to play. Similarly selecting right supplier plays a vital role in product procurement. To have smooth supply chain mechanism every process which has direc...