A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities

Uloženo v:
Podrobná bibliografie
Název: A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities
Autoři: J. Santhosh Kumar, B., R. Pushpa, B.
Zdroj: International Journal of Engineering & Technology; Vol 7, No 4.36 (2018): Special Issue 36; 762-765 ; 2227-524X ; 10.14419/ijet.v7i4.36
Informace o vydavateli: Science Publishing Corporation
Rok vydání: 2018
Témata: URL (Uniform Resource Locator), Google Dork, HTTP (Hyper Text transfer protocol, SQL (Structured Query Language), Open Web Application Security Project (OWASP), XSS (CRSOSS SITE SCRIPTING), info, geo
Popis: A single file on web contains text, images, audio, video and formatting instructions enclosed within a script. Website files are hosted on servers. The Servers “serve” those files to individual users upon request. Anonymous user with minimum user credentials can request on behalf of legitimate user to grab sensitive, confidential and personal information without legitimate users knowledge.[3] The proposed method makes use of URL as input for finding web vulnerabilities. Testing of proposed method is conducted to evaluate the performance based on the accuracy received. Performance is evaluated based on false negative and false positive results. Experiment is also conducted for web vulnerability assessment and penetration testing. The proposed method also checks for information grabbing from web using Google dork. Google dork helps to enter a network without permission and/or gain access to unauthorized information. Advanced search strings called Google dork queries used to locate sensitive information. This paper describes the method for web application vulnerabilities detection by using google dork, bypass first level security in any web and hack username and password in social networking site.
Druh dokumentu: article in journal/newspaper
Jazyk: English
Relation: https://www.sciencepubco.com/index.php/ijet/article/view/24237
Dostupnost: https://www.sciencepubco.com/index.php/ijet/article/view/24237
Rights: undefined
Přístupové číslo: edsbas.B165BE10
Databáze: BASE
Popis
Abstrakt:A single file on web contains text, images, audio, video and formatting instructions enclosed within a script. Website files are hosted on servers. The Servers “serve” those files to individual users upon request. Anonymous user with minimum user credentials can request on behalf of legitimate user to grab sensitive, confidential and personal information without legitimate users knowledge.[3] The proposed method makes use of URL as input for finding web vulnerabilities. Testing of proposed method is conducted to evaluate the performance based on the accuracy received. Performance is evaluated based on false negative and false positive results. Experiment is also conducted for web vulnerability assessment and penetration testing. The proposed method also checks for information grabbing from web using Google dork. Google dork helps to enter a network without permission and/or gain access to unauthorized information. Advanced search strings called Google dork queries used to locate sensitive information. This paper describes the method for web application vulnerabilities detection by using google dork, bypass first level security in any web and hack username and password in social networking site.