Essays about: "xss"

Showing result 1 - 5 of 15 essays containing the word xss.

  1. 1. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE

  2. 2. The Status Of Web Security In Sweden

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Firas Alkhateeb; [2022]
    Keywords : DNSsec; HTTPS; HSTS; X-Frame; X-Content-Type-Options; Content-Security-Policy CSP ; Referrer-Policy; Digital certificate X.509 ;

    Abstract : Getting incorrect website content has increased in recent years, which is a reflection of the web security status on the Internet. However, when It comes to government and other professional organisations websites, they should have the best security requirements and follow security recommendations. READ MORE

  3. 3. Input Validation and Input Sanitization for Web Applications

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Kevin Alemi Pedram; [2021]
    Keywords : ;

    Abstract : The rise of web-based applications is rapidly increasing with time and demand. As more and more web applications are being developed, so are the threats against these web applications' user-base. Input-basedattacks against web applications are becoming more common. A new task is in the hands of the developers, namely input handling. READ MORE

  4. 4. Ethical Hacking of an IoT camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nicolai Hellesnes; [2021]
    Keywords : security; IoT camera; IoT; penetration testing; threat modeling; säkerhet; IoT-kamera; IoT; penetrationstestning; hotmodellering;

    Abstract : With the fast growing popularity of IoT devices, a new entry point for cyber attacks is emerging. As IoT devices such as security cameras become more widely used in settings where security and privacy can be considered a key concern, more research about these devices must be done to ensure that the security requirements are met. READ MORE

  5. 5. Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Erik Matti; [2021]
    Keywords : Open source; Web vulnerability scanner; SQL injection; XSS; cross-site scripting; OWASP ZAP; Web security; Web application;

    Abstract : Both for its simplicity and efficiency to search for the most critical security vulnerabilities that could exist within a web application, a web vulnerability scanner is a popular tool among any company that develops a web application. With the existence of many different scanners that are available to use, one is unlikely the same as the other and the results attained when evaluating these scanners in relation to each other are often not the same. READ MORE