Essays about: "Vulnerability scanner"

Showing result 1 - 5 of 13 essays containing the words Vulnerability scanner.

  1. 1. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  2. 2. Study of the techniques used by OWASP ZAP for analysis of vulnerabilities in web applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Adam Jakobsson; Isak Häggström; [2022]
    Keywords : SQL injection; Cross-site scripting; Web vulnerability scanner; Web security;

    Abstract : Today, new web applications are made every single day with increasingly more sensitive data to manage. To ensure that no security vulnerabilities such as data leakage in web applications exist, developers are using tools such as a web vulnerability scanner. READ MORE

  3. 3. Environmentally aware vulnerability prioritisation within large networks : A proposed novel method

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Marcus Lenander; Jakob Tigerström; [2022]
    Keywords : Software vulnerability management; vulnerability prioritisation; CVSS; environmental metrics; cyber security; Hantering av sårbarhet i programvara; prioritering av sårbarheter; CVSS; Miljömetrik; cybersäkerhet;

    Abstract : Background. Software vulnerabilities are a constant threat to organisations, businesses, and individuals. Keeping all devices patched from security software vulnerabilities is complex and time-consuming. Companies must use resources efficiently to ensure that the most severe security vulnerability is prioritised first. READ MORE

  4. 4. Network Hardening of Multilayer Switch

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Peter Pekkanen; David Söderman; [2021]
    Keywords : ;

    Abstract : In today’s computer networking and industrial networking, security holds a significant role in keeping the entire network safe from malicious users or attackers from remote locations. Using vulnerability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. READ MORE

  5. 5. Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Erik Matti; [2021]
    Keywords : Open source; Web vulnerability scanner; SQL injection; XSS; cross-site scripting; OWASP ZAP; Web security; Web application;

    Abstract : Both for its simplicity and efficiency to search for the most critical security vulnerabilities that could exist within a web application, a web vulnerability scanner is a popular tool among any company that develops a web application. With the existence of many different scanners that are available to use, one is unlikely the same as the other and the results attained when evaluating these scanners in relation to each other are often not the same. READ MORE