Skip to main content

Relating Vulnerability and Security Service Points for Web Application Through Penetration Testing

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 714))

  • 887 Accesses

Abstract

In last decade, there have been enormous changes in the field of web applications. The phase has shifted from static to dynamic, and fixed layout has now taken the form of responsive layout, due to distribution of processing capabilities from server side to client side, mainly because of rich set of scripts for user interface and making request to server. This leads to reduction in network traffic. This is on the presumption of trustiness on client, eventually creating a web application more vulnerable. This paper will cover importance of each triad of web, mainly security with its service points. This will facilitate a developer to identify which service point is more important with respect to application requirements. It will also apply sufficient security checks at service point in each component of the application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Joel Scambray, Mike Shema: Hacking exposed: Web Application, McGraw-Hill (2002)

    Google Scholar 

  2. Dafydd Stuttard, Marcus Pinto: The Web Application Hacker’s Handbook, Second Edition, Finding and Exploiting Security Flaws, John Wiley & Sons (2011)

    Google Scholar 

  3. R Kachhwaha, P Patni: Ajax enabled web application model with comet programming, International Journal of Engineering and Technology, Volume 2 No. 7, pp. 1155–1161 (2012)

    Google Scholar 

  4. Stuart McClure, Joel Scambray, George Kurtz: Hacking Exposed 7: Network Security Secrets & Solutions, McGraw-Hill (2012)

    Google Scholar 

  5. Stephen Northcutt, Jerry Shenk, Dave Shackleford, Tim Rosenberg, Raul Siles, Steve Mancini: Penetration Testing: Assessing your overall security before an attacker do, SANS Institute (2006)

    Google Scholar 

  6. Kali Linux Tools Listing https://tools.kali.org/tools-listing

  7. Acunetix Web Vulnerability Scanner https://www.acunetix.com/

  8. SQLMAP http://sqlmap.org/

  9. John D. Meier, Web application security frame (Patents: US 7818788 B2), http://www.google.co.in/patents/US7818788

  10. AltoroMutual, http://demo.testfire.net/

  11. OWASP https://www.owasp.org

  12. OWASP Top Ten Project https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

  13. OWASP Top Ten Vulnerabilities https://www.owasp.org/index.php/Top_10_2017-Risk

  14. OWASP AltoroMutual https://www.owasp.org/index.php/AltoroMutual

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajendra Kachhwaha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kachhwaha, R., Purohit, R. (2019). Relating Vulnerability and Security Service Points for Web Application Through Penetration Testing. In: Panigrahi, C., Pujari, A., Misra, S., Pati, B., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 714. Springer, Singapore. https://doi.org/10.1007/978-981-13-0224-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0224-4_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0223-7

  • Online ISBN: 978-981-13-0224-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics