Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
This report focuses on vulnerabilities on web-applications and web-sites from Cross-Site Scripting attacks (XSS). The different types of XSS attacks are examined: DOM-based, active and passive attacks. The spread of XSS attacks across... more
    • by 
    •   4  
      Computer ScienceComputer SecurityWeb Application SecurityCross Site Scripting
Obtaining the desired dataset is still a prime challenge faced by researchers while analysing Online Social Network (OSN) sites. Application Programming Interfaces (APIs) provided by OSN service providers for retrieving data impose... more
    • by 
    •   8  
      Computer ScienceMachine LearningSocial Network Analysis (SNA)Intrusion Detection Systems
We propose a log-based analysis tool for evaluating web application computer system. A feature of the tool is an integration software log with infrastructure log. Software engineers alone can resolve system faults in the tool, even if the... more
    • by 
    •   26  
      Software EngineeringInfrastructure PlanningSoftware TestingSoftware Development
    • by  and +1
    •   12  
      Software EngineeringWeb EngineeringSemantic WebMass Customization
Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central... more
    • by 
    •   12  
      Static AnalysisEncryptionDatabasesSecurity Engineering
    • by 
    •   16  
      Artificial IntelligenceVisualizationMachine LearningNetwork Security
In this article, we will discuss keylogger attacks with xss.
    • by 
    •   18  
      Information SecuritySecurity in Web ServicesMalwareWeb Application Security
Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals. Read... more
    • by 
    •   5  
      Application SecurityWeb Application SecurityWeb Application Security TestingSecurity in Web Applications
Abstract-- When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information... more
    • by 
    •   6  
      PrivacySecurityVulnerabilityWeb Application Security
    • by 
    •   3  
      Language-based securityWeb Application SecurityJavaScript security
Fuzz testing (also known as fuzzing) is a blackbox testing technique for finding flaws in software by feeding random input into applications and monitoring for crashes. Programs that generate fuzz data are called fuzzers and they generate... more
    • by 
    •   4  
      Web DevelopmentWeb Application SecurityInternet and web securityFuzzing
    • by 
    •   4  
      Web Application SecuritySql InjectionField StudyInternet
Web Applications security has become progressively more important these days. Enormous numbers of attacks are being deployed on the web application layer. Due to dramatic increase in Web applications, security gets vulnerable to variety... more
    • by  and +1
    •   4  
      Survey ResearchWeb Application SecurityWeb Application FirewallWAF Market, Web Application Firewall Market
    • by 
    •   9  
      EngineeringTechnologyComputer NetworksSoftware Testing
    • by 
    •   7  
      Security in Web ServicesWeb Application SecurityMobile Applications and Web Applications developmentWeb Security
    • by 
    •   4  
      Web Application SecuritySql InjectionMalware DetectionVulnerabilities
Aplikasi web biasanya perlu menyimpan informasi yang sensitif seperti password, informasi kartu kredit, dan yang lain. Dikarenakan item-item tersebut bersifat sensitif item-item tersebut perlu dienkripsi untuk menghindari pengaksesan... more
    • by 
    • Web Application Security
Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. There is an urgent need for a new generation of computational theories and tools to assist... more
    • by 
    •   17  
      Computer ScienceData MiningWeb ApplicationsWireless Networks (Computer Science)
La web se ha convertido en una plataforma de distribución de aplicaciones de todo tipo. Negocios de variados tamaños y rubros disponen de aplicaciones web para captar clientes, administrar ventas, mantener registro de todos los... more
    • by 
    •   2  
      Web Application SecurityInternet and web security
    • by 
    •   6  
      Risk and VulnerabilityWeb ApplicationsComputer SecurityWeb Application Security
    • by 
    •   9  
      CybercrimesNetwork SecurityComputer NetworksDatabase Security
Code Injection techniques in Application Security enables an attacker/ a malware artist or a hacker/ethical hacker/ penetration tester to leverage advantage of missing security controls over JavaScript Execution on top of the application... more
    • by 
    •   11  
      Information SecurityInformation Security AuditingComputer SecurityEthical Hacking
Deep web content cannot be indexed by search engine such as Google, Yahoo and Bing and darknet is lies within the deep web. Dark web has been intentionally hidden and it is not accessible through standard browser. Deep web can be accessed... more
    • by 
    •   7  
      Computer ScienceThe InternetMalware AnalysisMobile Security
    • by 
    •   18  
      Computer ScienceInformation SecurityUser Experience (UX)Wearable Computing
Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web... more
    • by 
    •   3  
      Web Application SecurityCyber SecurityPenetration Testing
SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as... more
    • by 
    •   6  
      Web ApplicationsVulnerabilityWeb Application SecurityOWASP
    • by 
    • Web Application Security
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a special approach to eliminate various security... more
    • by  and +1
    •   3  
      Web Application SecurityCyber SecurityPenetration Testing
Today web-based systems are very popular. These systems may have some inherent security vulnerabilities due to the languages they use. It is very important to identify these vulnerabilities for the development of quality and secure web... more
    • by 
    •   13  
      Information SystemsComputer ScienceInformation TechnologyTechnology
The numbers of security vulnerabilities that are being found today are much higher in applications than in operating systems. This means that the attacks aimed at web applications are exploiting vulnerabilities at the application level... more
    • by  and +1
    •   2  
      Web ApplicationsWeb Application Security
After completing attack, covering tracks is the next step in penetration testing. In tracks covering after completing attack we will return to each exploited system to erase tracks and clean up all footprints we left behind. Tracks... more
    • by  and +1
    •   16  
      Information SecurityWeb Application SecurityWeb ProgrammingCyber Security
Remote File Inclusion / Local File Inclusion [Attack and Defense Techniques]
    • by 
    •   9  
      Risk and VulnerabilitySecurity in Web ServicesComputer SecurityVulnerability
Abstract-Web application security is the hottest issue in the present scenario of e-business environment. Web application attacks can play havoc with the system within no time. More than 80% attacks are at application layer and almost 90%... more
    • by 
    •   20  
      Information TechnologyService Oriented ArchitectureComputer SecurityDatabases
Web applications are becoming a requisite mediator to provide access to the various on-line dynamic web services. As more features add to making interactive and efficient web applications, attackers get more options to bypass those... more
    • by  and +1
    •   4  
      Information SecurityWeb Application SecurityCross Site ScriptingXSS vulnerability
Questo progetto tratta gli attacchi ad iniezione e, in particolare, approfondisce gli attacchi command injection e SQL injection. La scelta è nata in seguito a considerazioni legate al rischio di sicurezza. Nella prima parte definisco... more
    • by 
    •   9  
      Risk and VulnerabilityWeb ApplicationsHackingComputer Hacking
    • by 
    •   5  
      Computer ScienceWeb Application SecuritySql InjectionMalware Detection
Esta es una tesis elaborada para demostrar las fases de una prueba de penetración (pentesting) en entornos GNU Linux, en una empresa Guatemalteca.
    • by 
    •   3  
      Ethical HackingWeb Application SecurityPentesting
It was an OWASP Local Chapter where I described about the difference between a typical web architecture and a secured web architecture. The things to be taken care of to built a web application.
    • by 
    •   3  
      Web Application SecurityWeb Application Security TestingSecurity in Web Applications
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
    • by 
    •   12  
      Network SecurityBiometricsCryptographyBiometrics Authentication Technologies
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services.... more
    • by 
    •   30  
      Risk and VulnerabilitySecurity in Web ServicesRisk and Vulnerability - Natural HazardsVulnerability
Modern web applications have higher user expectations and greater demands than ever before. The security of these applications is no longer optional; it has become an absolute necessity. Web applications contain vulnerabilities, which may... more
    • by  and +1
    •   5  
      Web ApplicationsWeb Application SecurityInternet and web securityWeb Application Security Testing
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services.... more
    • by 
    •   20  
      Cloud ComputingDistributed System # Peer-to-Peer # Philosophy # Security # Semantic Web # Sensor Network SecurityWeb Application SecurityComputer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security OntologiesInternet and web security
Abstract. Many companies are deploying their business on the Internet using web applications while the question of what is the risk to business operations of cyber-attacks remains unanswered. Risk awareness allows to identify and act upon... more
    • by 
    •   3  
      Web Application SecurityHoneypotIT Risks
Teknologi website pada awalnya hanya menggunakan HTML yang digunakan untuk menampilkan konten-konten yang bersifat statis (web 1.0). Pada perkembangannya terutama pada era website modern (web 2.0), penggunaan bahasa HTML dikombinasikan... more
    • by  and +1
    •   6  
      Semantic Web TechnologiesDatabase SystemsWeb TechnologiesComputer Programming
This paper talks about the nuisances of HTTP Parameter Pollution - a web application based attack used by penetration testers to pollute the parameters and use these same techniques for significant bypasses which could trigger or support... more
    • by 
    •   5  
      Web 2.0Web TechnologiesWeb ApplicationsWeb Application Security