Abstract
In last decade, there have been enormous changes in the field of web applications. The phase has shifted from static to dynamic, and fixed layout has now taken the form of responsive layout, due to distribution of processing capabilities from server side to client side, mainly because of rich set of scripts for user interface and making request to server. This leads to reduction in network traffic. This is on the presumption of trustiness on client, eventually creating a web application more vulnerable. This paper will cover importance of each triad of web, mainly security with its service points. This will facilitate a developer to identify which service point is more important with respect to application requirements. It will also apply sufficient security checks at service point in each component of the application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Joel Scambray, Mike Shema: Hacking exposed: Web Application, McGraw-Hill (2002)
Dafydd Stuttard, Marcus Pinto: The Web Application Hacker’s Handbook, Second Edition, Finding and Exploiting Security Flaws, John Wiley & Sons (2011)
R Kachhwaha, P Patni: Ajax enabled web application model with comet programming, International Journal of Engineering and Technology, Volume 2 No. 7, pp. 1155–1161 (2012)
Stuart McClure, Joel Scambray, George Kurtz: Hacking Exposed 7: Network Security Secrets & Solutions, McGraw-Hill (2012)
Stephen Northcutt, Jerry Shenk, Dave Shackleford, Tim Rosenberg, Raul Siles, Steve Mancini: Penetration Testing: Assessing your overall security before an attacker do, SANS Institute (2006)
Kali Linux Tools Listing https://tools.kali.org/tools-listing
Acunetix Web Vulnerability Scanner https://www.acunetix.com/
SQLMAP http://sqlmap.org/
John D. Meier, Web application security frame (Patents: US 7818788 B2), http://www.google.co.in/patents/US7818788
AltoroMutual, http://demo.testfire.net/
OWASP https://www.owasp.org
OWASP Top Ten Project https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
OWASP Top Ten Vulnerabilities https://www.owasp.org/index.php/Top_10_2017-Risk
OWASP AltoroMutual https://www.owasp.org/index.php/AltoroMutual
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kachhwaha, R., Purohit, R. (2019). Relating Vulnerability and Security Service Points for Web Application Through Penetration Testing. In: Panigrahi, C., Pujari, A., Misra, S., Pati, B., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore. https://doi.org/10.1007/978-981-13-0224-4_4
Download citation
DOI: https://doi.org/10.1007/978-981-13-0224-4_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0223-7
Online ISBN: 978-981-13-0224-4
eBook Packages: EngineeringEngineering (R0)