Summary, etc |
In Recent times the use of Web-Application is increasing as a large number of E-commerce,<br/>Private and Public sectors try to make access to their product, goods and information easily<br/>accessible at low costs and little need for additional hardware or software configuration.<br/>However, in the past decade there has been an Increase in Web-Application Exploitation<br/>attacks ranging from the Aurora Attack at Google which took place in the 2000s(ZDNet,2020)<br/>A penetration test (CodeDx,2018), or pen test, is a simulated attack against Your web-based<br/>framework. Previously, the majority of penetration tests were conducted on networks, rather<br/>than on software operating on those networks.<br/>The aim of a pen test is to find bugs that can be abused by an outside intruder in your<br/>application. Penetration checking may be done against the different types of code and<br/>frameworks used in your program, such as APIs and servers.<br/>This project focuses on analysis of deployed open source Web-Applications their<br/>vulnerabilities and possible threat levels and ways to best protect the Web-Applications<br/>Key-words: Web-Application, Website, Penetration Testing, Injection, Cross-site<br/>Scripting (XSS), Security-Misconfiguration, Vulnerability analysis |