SlideShare une entreprise Scribd logo
1  sur  12
Project Review - I
on
“Web Application Bug Finder”
Guided By : Prof.Ashwini
Taksal
JSPM’s
Bhivarabai Sawant Institute of Technology
& Research
Accredited with ‘B++’ Grade by NAAC
)
Mr.Satyadeep
Jagtap (
B190738529)
Mr.Rushikesh
Zende (-)
Department of Information Technology
Introduction
• Introduction
• Problem Statement
• Motivation
• Literature Survey
• Objectives
• Block Diagram
• Requirements
• Conclusion
Contents :
Introduction
➤ The Internet is a dangerous place! With great regularity, we hear about
websites becoming unavailable due to denial of service attacks, or displaying
modified (and often damaging) information on their homepages.
➤The purpose of website security is to prevent these (or any) sorts of attacks.
➤The more formal definition of website security is the act/practice of
protecting websites from unauthorized access, use, modification, destruction,
or disruption.
Problem Statement
➤ To identify the vulnerabilities of the website for the purpose of improving
the
security features and creating a blockchain based website.Website is made for
the
registration of the passport which contains the personal details of the
individual.
Attack is performed on the website which is created of our own using block
chain
Motivation
• The scope of the project to enhance the security of web applications.
• In this project bugs are found by automated process not by manually.
Literature Survey
Sr.
No
.
Paper Name Authors Publication Year Conclusion
1
Finding Bugs in
Web Applications
Using
Dynamic Test
Generation and
Explicit-State
Model Checking
Shay Artzi, Adam
Kiezun, Julian Dolby 2010
Web script crashes and malformed
dynamically generated webpages are
common errors, and they seriously impact
the
usability of Web applications. Current tools
for webpage validation cannot handle the
dynamically generated pages that are
ubiquitous
on today’s Internet
Web Security:
Research
Challenges and
Open Issuesg
V. Geetha &
Pranesh. V. Kallapur 2011
It has been observed for a quite long time
that Web Security has been one of hot
research areas, from point of view of be it
either analysis or detection and later
developing mitigation plans. Web security
threats have undergone much
sophistication compared to their initial
introduction and they are becoming more
& more evolved everyday.
Literature Survey
Paper Name Authors Publication Year Conclusion
3
A Study on Web
Application
Security and
Detecting
Security
Vulnerabilities
Sandeep Kumar
Renuka Mahajan
Naresh Kumar
Sunil Kumar Khatri
2017
The world is exceedingly reliant on the
Internet.
Nowadays, web security is biggest
challenge in the corporate
world. It is considered as the principle
framework for the
worldwide data society. Web applications
are prone to security
attacks.
4 A Framework for
Web Application
Vulnerability
Detection
Asra Kalim, C K Jha,
Deepak Singh Tomar,
Divya Rishi Sahu
2020
In today’s era one of the roles of web
applications is to
provide graphical user interface to the end
users for
communicating the devices through
internet. Development
and hosting of web application is too easy.
Hence, new
attack vectors are encountering frequently
to breach the end
user’s information.
Objectives
➤ Web Testing checks for functionality, usability, security, compatibility,
performance of the web application or website.
➤ During this stage issues such as that of web application security, the
functioning of the site, its access to handicapped as well as regular users
and its ability to handle traffic is checked
Block Diagram:-
Fig1. Block diagram of image processing
Hardware/Software
Requirements
Hardware Requirements :
Laptop
Software Requirements :
Python
Internet
Operating system :
Windows / Linux
Conclusion
• The study showed that Automated web application bug finding is easy
than manual process.
• It shows that it can reduce the time and human effots.
…Thank You !!!

Contenu connexe

Similaire à FinalProjectPresentation.ppt

A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...
IJECEIAES
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Security
ijtsrd
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
IJNSA Journal
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Aditya K Sood
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
pivotalsecurity
 

Similaire à FinalProjectPresentation.ppt (20)

How to produce more secure web apps
How to produce more secure web appsHow to produce more secure web apps
How to produce more secure web apps
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptx
 
The magnite ppt slides
The magnite ppt slidesThe magnite ppt slides
The magnite ppt slides
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2
 
Web Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptxWeb Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptx
 
Dallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security ThreatsDallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security Threats
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Security
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
SuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-tSuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-t
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Ownux global Aug 2023.pdf
Ownux global Aug 2023.pdfOwnux global Aug 2023.pdf
Ownux global Aug 2023.pdf
 
WEB SECURITY
WEB SECURITYWEB SECURITY
WEB SECURITY
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 

Dernier

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

FinalProjectPresentation.ppt

  • 1. Project Review - I on “Web Application Bug Finder” Guided By : Prof.Ashwini Taksal JSPM’s Bhivarabai Sawant Institute of Technology & Research Accredited with ‘B++’ Grade by NAAC ) Mr.Satyadeep Jagtap ( B190738529) Mr.Rushikesh Zende (-) Department of Information Technology
  • 2. Introduction • Introduction • Problem Statement • Motivation • Literature Survey • Objectives • Block Diagram • Requirements • Conclusion Contents :
  • 3. Introduction ➤ The Internet is a dangerous place! With great regularity, we hear about websites becoming unavailable due to denial of service attacks, or displaying modified (and often damaging) information on their homepages. ➤The purpose of website security is to prevent these (or any) sorts of attacks. ➤The more formal definition of website security is the act/practice of protecting websites from unauthorized access, use, modification, destruction, or disruption.
  • 4. Problem Statement ➤ To identify the vulnerabilities of the website for the purpose of improving the security features and creating a blockchain based website.Website is made for the registration of the passport which contains the personal details of the individual. Attack is performed on the website which is created of our own using block chain
  • 5. Motivation • The scope of the project to enhance the security of web applications. • In this project bugs are found by automated process not by manually.
  • 6. Literature Survey Sr. No . Paper Name Authors Publication Year Conclusion 1 Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking Shay Artzi, Adam Kiezun, Julian Dolby 2010 Web script crashes and malformed dynamically generated webpages are common errors, and they seriously impact the usability of Web applications. Current tools for webpage validation cannot handle the dynamically generated pages that are ubiquitous on today’s Internet Web Security: Research Challenges and Open Issuesg V. Geetha & Pranesh. V. Kallapur 2011 It has been observed for a quite long time that Web Security has been one of hot research areas, from point of view of be it either analysis or detection and later developing mitigation plans. Web security threats have undergone much sophistication compared to their initial introduction and they are becoming more & more evolved everyday.
  • 7. Literature Survey Paper Name Authors Publication Year Conclusion 3 A Study on Web Application Security and Detecting Security Vulnerabilities Sandeep Kumar Renuka Mahajan Naresh Kumar Sunil Kumar Khatri 2017 The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. 4 A Framework for Web Application Vulnerability Detection Asra Kalim, C K Jha, Deepak Singh Tomar, Divya Rishi Sahu 2020 In today’s era one of the roles of web applications is to provide graphical user interface to the end users for communicating the devices through internet. Development and hosting of web application is too easy. Hence, new attack vectors are encountering frequently to breach the end user’s information.
  • 8. Objectives ➤ Web Testing checks for functionality, usability, security, compatibility, performance of the web application or website. ➤ During this stage issues such as that of web application security, the functioning of the site, its access to handicapped as well as regular users and its ability to handle traffic is checked
  • 9. Block Diagram:- Fig1. Block diagram of image processing
  • 10. Hardware/Software Requirements Hardware Requirements : Laptop Software Requirements : Python Internet Operating system : Windows / Linux
  • 11. Conclusion • The study showed that Automated web application bug finding is easy than manual process. • It shows that it can reduce the time and human effots.