Intelligent Web Security Testing with Threat Assessment and Client Server Penetration

Author(s):  
Hardik Gohel ◽  
Priyanka Sharma
2018 ◽  
Vol 10 (1) ◽  
pp. 83 ◽  
Author(s):  
Md. Shohrab Hossain ◽  
Arnob Paul ◽  
Md. Hasanul Islam ◽  
Mohammed Atiquzzaman

Web communications between the server and the client are being used extensively. However, session hijacking has become a critical problem for most of the client-server communications. Among different session hijacking attacks, SSL stripping is the most dangerous attack. There are a number of measures proposed to prevent SSL tripping-based session hijacking attacks. However, existing surveys did not summarize all the preventive measures in a comprehensive manner (without much illustration and categorization). The objective of this paper is to provide a  comprehensive survey of existing measures against SSL stripping-based session hijacking attacks and compare those measures. In this paper, we have classified all the existing preventive measures for SSL stripping-based session hijacking attacks into two main categories: client-side measures and serverside measures. We have illustrated the proposed solutions comprehensively with useful diagrams for clarification. We have also compared them based on different performance criteria. This paper will help web security researchers to have a comparative analysis of all solutions for the SSL stripping based attacks, thereby improving existing solutions to better protect the users from session hijacking attacks.


Author(s):  
Josip Bozic ◽  
Bernhard Garn ◽  
Ioannis Kapsalis ◽  
Dimitris Simos ◽  
Severin Winkler ◽  
...  

2016 ◽  
Vol 5 (1) ◽  
pp. 19-28 ◽  
Author(s):  
Imam Riadi ◽  
Eddy Irawan Aristianto

The development of computer security technology is very rapidly. Web security is one of the areas that require particular attention related to the abundance of digital crimes conducted over the web. Unrestricted file upload image is a condition in the process of uploading pictures is not restricted. This can be used to make the attacker retrieve the information that is contained in a system. This research developed with several stages, such as, data collection, analysis of the current conditions, designing improvements to the program code, testing and implementation of the results of patch. Security testing is performed to find out the difference between before and after conditions applied patch unrestricted image file upload. Based on the results of testing done by the method of penetration testing results obtained before the application of patch unrestricted image file upload results respondents said 15% strongly disagree, 85% did not agree. Testing after applying patch unrestricted image file upload results respondents said 7.5% strongly agree, 92.5% agree, so it can be concluded that the development of the patch that has been done has been running smoothly as expected.


Sign in / Sign up

Export Citation Format

Share Document