Website Vulnerability Scanner
Main Article Content
Keywords
Cyber security, vulnerability, penetration testing, website scanning
Abstract
In today’s world, cyber security has become an important leap in the form for jobs, education. But the reality is the only a few are aware of the major wed vulnerabilities. Some statistical studies show that small scale industries are directly and indirectly connected to the world of internet, but penetration testing, we are going to do this project. In a website if there are any vulnerability, the website can easily hack. So, using penetration testing we are going to built a scanner which will find the vulnerabilities the website. With the help of vulnerability scanning in a website, inspection of the potential points of exploit on a website to identify security holes. A vulnerability scan will deduct and classifies system weeness. It will also deduct bugs in a website and communication equipment. It will predict effeteness of counter measure.
References
2. Sheetal Bairwa, Bhawna Mewara and Jyoti Gajrani, “Vulnerability Scanners: A Proactive Approach to Assess Web Application Security”, (2014)
3. S. El Idrissi, N. Berbiche, F. Guerouate and M. Sbihi, “Performance Evaluation of Web Application Security Scanners for Prevention and Protection against Vulnerabilities”, (2017).
4. Acunetix:https://www.acunetix.com/vulnerabilityscanner/
5. Nikto: https://hackertarget.com/nikto-website-scanner/
6. Burp Suite: https://portswigger.net/burp
7. YU Shiyuan, WANG Yutian, LIU Xin, “Burp Suite Extender Apply in Vulnerability Scanning”, (2018).
8. Balume Mburano, “Evaluation of web vulnerability based on OWASP Benchmark”, (2017).
9. Deepika Sagar, Sahil Kukreja, Jwngfu Brahma, Shobha Tyagi, Prateek Jain, ”Studying Open Source Vulnerability Scanners For Vulnerabilities In Web Applications”, (2017).
10. Kinnaird McQuade, “Open Source Web Vulnerability Scanners”, (2014).
11. Y.Makino and V.Klyuev, “Evaluation of web vulnerability scanners,” IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), (2015)