It is clear that the Internet has played an increasingly important role in how people conduct their lives in the modern age. What is equally clear, however, is that as the convenience and usefulness increase, so do the risks that may result from attacks against the users and the systems. As can be seen from news headlines in the popular press, attacks against web applications, specifically, have become a daily occurrence. Researchers and practitioners alike have addressed this problem in various ways including making analysis tools available for different stages of development and deployment of web applications. Currently, there are many such tools for many purposes such as static analysis and penetration testing.
This work explores common tools and techniques for securing web applications. For concreteness, we apply secure design principles and penetration testing tools to secure a specific web application, namely that implemented for the project entitled "Exploiting Social Media to Help Locate Missing Persons [x]." In order to learn relevant tools and techniques, we went over exercises offerred by a few security training packages including OWASP's WebGoat and RandomStorm's Damn Vulnerable Web Application (DVWA). The eventual outcome is that we successfully protected the targeted web application against common source code analysis attacks, static resource discovery, database tampering attacks, configuration attacks, and cross-site scripting attacks
It is clear that the Internet has played an increasingly important role in how people conduct their lives in the modern age. What is equally clear, however, is that as the convenience and usefulness increase, so do the risks that may result from attacks against the users and the systems. As can be seen from news headlines in the popular press, attacks against web applications, specifically, have become a daily occurrence. Researchers and practitioners alike have addressed this problem in various ways including making analysis tools available for different stages of development and deployment of web applications. Currently, there are many such tools for many purposes such as static analysis and penetration testing. This work explores common tools and techniques for securing web applications. For concreteness, we apply secure design principles and penetration testing tools to secure a specific web application, namely that implemented for the project entitled "Exploiting Social Media to Help Locate Missing Persons [x]." In order to learn relevant tools and techniques, we went over exercises offerred by a few security training packages including OWASP's WebGoat and RandomStorm's Damn Vulnerable Web Application (DVWA). The eventual outcome is that we successfully protected the targeted web application against common source code analysis attacks, static resource discovery, database tampering attacks, configuration attacks, and cross-site scripting attacks
การแปล กรุณารอสักครู่..
