WEB VULNERABILITY SCANNERS AND THEIR METHODS
Main Article Content
Аннотация:
Throughout this article, you can learn about Web Vulnerability Scanners and general concepts about choosing the right ones. general information and their working principles, including what components they consist of. In this article you can get detailed information about OWASP Zed Attack Proxy (ZAP) and Arach. their most common types of attacks include: Brute Force, Fuzzing, Auto-tagging, Dynamic SSL Certificate and exc. The article is not primarily about choosing scanners that detect vulnerabilities because it also provides assumptions about what choices we should make depending on the type of vulnerability.
Article Details
Как цитировать:
Библиографические ссылки:
N. I. Daud, K. A. A. Bakar, and M. S. M. Hasan, "A case study on web application vulnerability scanning tools," in 2014 Science and Information Conference, 2014, pp. 595-600.
S. Chen. (2017). Price and Feature Comparison of Web Application Scanners. Available: http://sectoolmarket.com/price-and-feature-comparison-of-web-application-scannersunified-list.html
A. Alzahrani, A. Alqazzaz, Y. Zhu, H. Fu, and N. Almashfi, "Web Application Security Tools Analysis," in 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids), 2017, pp. 237- 242.
C. Subramanian, H. T. Le, P. K. K. Loh, and A. B. Premkumar, "Quantitative Evaluation of Related Web-Based Vulnerabilities," in 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion, 2010, pp. 118-125.
Darknet. (2017). wavsep-web-application-vulnerability-scanner-evaluation-project. Available: https://www.darknet.org.uk/2011/09/wavsep-web-application-vulnerabilityscanner- evaluation-project/