2022
DOI: 10.18280/rces.090101
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Web Application Vulnerability Assessment and Penetration Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 0 publications
0
0
0
Order By: Relevance
“…Within this framework, this article provides a total of eight comprehensive labs dedicated to Android and iOS platforms, each exploring into distinct yet interconnected features of security testing. The subsequent sections introduce Android and iOS penetration testing [32], encompassing fundamental platform insights [33], essential open-source tools [34], and lab setup procedures [35]. Table 9 provides the eight pen testing labs for Android and iOS platforms.…”
Section: Mobile Penetration Testing Labsmentioning
confidence: 99%
“…Within this framework, this article provides a total of eight comprehensive labs dedicated to Android and iOS platforms, each exploring into distinct yet interconnected features of security testing. The subsequent sections introduce Android and iOS penetration testing [32], encompassing fundamental platform insights [33], essential open-source tools [34], and lab setup procedures [35]. Table 9 provides the eight pen testing labs for Android and iOS platforms.…”
Section: Mobile Penetration Testing Labsmentioning
confidence: 99%
“…Vamsi et al [18] emphasized the critical importance of regular security testing and checks through vulnerability assessment and penetration testing (VAPT) to safeguard organizational data and maintain customer trust. They detail common web application security vulnerabilities and the prerequisites for conducting any security assessment, alongside the dos and don'ts in alignment with each vulnerability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…OWASP ZAP is a standard open-source tool that performs better than other scanning tools with a user-friendly interface and is used for penetration testing; hence, this tool is usable by anyone with different abilities in security software [13]. In addition, OWASP ZAP is capable of critical scanning vulnerabilities such as SQL injection, Cross-Site Scripting, remote OS command, Path Traversal, External Redirect, and Remote File Inclusion [28]. Furthermore, OWASP ZAP can also detect command execution vulnerabilities due to high results for true and false positives, resulting in the researcher concluding that OWASP ZAP performs better than other vulnerability scanners [12].…”
Section: Owasp Zapmentioning
confidence: 99%
“…In 2018, HackerOne reported that Cross-site Scripting (XSS) vulnerability was a vulnerability commonly found in all types of websites, and 40 percent of all applications tested recorded by Veracode detected the existence of Cross-site Scripting (XSS) vulnerability [32]. However, according to a study by [28], the Cross-site Scripting (XSS) vulnerability is undetected in the government websites in Malaysia, which also shows that this type of vulnerability in the Malaysian SMEs' websites was low.…”
Section: Total Web Vulnerabilities In the Malaysian Smes' Websitesmentioning
confidence: 99%