Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Improving penetration testing through static and dynamic analysis

Published: 01 September 2011 Publication History

Abstract

Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application's responses to determine whether an attack was successful. Techniques for performing these steps are often incomplete, which can leave parts of the web application untested and vulnerabilities undiscovered. This paper proposes a new approach to penetration testing that addresses the limitations of current techniques. The approach incorporates two recently developed analysis techniques to improve input vector identification and detect when attacks have been successful against a web application. This paper compares the proposed approach against two popular penetration testing tools for a suite of web applications with known and unknown vulnerabilities. The evaluation results show that the proposed approach performs a more thorough penetration testing and leads to the discovery of more vulnerabilities than both the tools. Copyright © 2011 John Wiley & Sons, Ltd.

Cited By

View all
  • (2021)Weak Password Scanning System for Penetration TestingCyberspace Safety and Security10.1007/978-3-030-94029-4_9(120-130)Online publication date: 9-Nov-2021
  • (2018)Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacksInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2018.09113714:2(103-122)Online publication date: 1-Jan-2018
  • (2016)A four-phase methodology for protecting web applications using an effective real-time techniqueInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2016.0830086:4(303-323)Online publication date: 1-Jan-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Software Testing, Verification & Reliability
Software Testing, Verification & Reliability  Volume 21, Issue 3
September 2011
109 pages

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 September 2011

Author Tags

  1. penetration testing
  2. test input generation
  3. web applications

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Weak Password Scanning System for Penetration TestingCyberspace Safety and Security10.1007/978-3-030-94029-4_9(120-130)Online publication date: 9-Nov-2021
  • (2018)Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacksInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2018.09113714:2(103-122)Online publication date: 1-Jan-2018
  • (2016)A four-phase methodology for protecting web applications using an effective real-time techniqueInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2016.0830086:4(303-323)Online publication date: 1-Jan-2016
  • (2016)Software Vulnerability Detection Methodology Combined with Static and Dynamic AnalysisWireless Personal Communications: An International Journal10.1007/s11277-015-3152-189:3(777-793)Online publication date: 1-Aug-2016
  • (2015)DLint: dynamically checking bad coding practices in JavaScriptProceedings of the 2015 International Symposium on Software Testing and Analysis10.1145/2771783.2771809(94-105)Online publication date: 13-Jul-2015
  • (2014)Automated Detection of Client-State Manipulation VulnerabilitiesACM Transactions on Software Engineering and Methodology10.1145/253192123:4(1-30)Online publication date: 5-Sep-2014
  • (2013)Detection Method of the Second-Order SQL Injection in Web ApplicationsStructured Object-Oriented Formal Language and Method10.1007/978-3-319-04915-1_11(154-165)Online publication date: 29-Oct-2013
  • (2012)Grammar based oracle for security testing of web applicationsProceedings of the 7th International Workshop on Automation of Software Test10.5555/2663608.2663612(15-21)Online publication date: 2-Jun-2012

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media