Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detailed view of threats, loop holes, bugs, back doors so that the it manger fix all these vulnerabilities and back doors will help to provide more security and better protection from malicious attacks. Vulnerabilities can be finding by in two ways, internal testing and external testing. Organization contact the third party vendors for pen-testing the whole organization, during the vapt some files may be altered. Vapt ensure that organization applications, web servers, database servers brought back to the initial state. Sql’s injections are in the top 10 attacks list published by owasp (open web application security project). Implementing manually sql’s injection to find the vulnerabilities on the web application and try to prevent these threats from exploitation.
Authors and Affiliations
Mohd Muneer Khan
Prime Numbers and Modular Exponentiation in Encryption and Decryption
The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...
slugInvestigation of Thermal Boundary Layer of non-Newtonian Fluid Past over a Wedge
This paper investigates the problem of steady, laminar, two-dimensional boundary layer flow and heat transfer of an incompressible, viscous non-Newtonian fluid over a wedge. A non-Newtonian fluid represented by power la...
Design of Novel Bridgeless AC-DC-AC Fly Back Convertor using Matlab
The aim of the project is to design and analyse of an AC-DC-AC fly back convertor without the usage of bridge circuit. Comparison of basic bridge diode circuit, which the flyback rectifier with a bridgeless topology can...
Threads in Operating System
This paper basically deals with threads used in an operating system. We have focused on the working and the ways of multithreaded system, how they are used to write a program in an efficient and effective way. The first...
Stair-Climbing Robot for Rescue Applications
If we want to save our manpower loss there is need in today’s world to place equipments in dangerous areas such as cameras and sensors. Robots are best option in place of manpower to do this task because of which we are...