Back close

A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities

Publication Type : Journal Article

Publisher : International Journal of Engineering and Technology

Source : International journal of engineering and technology, Volume 7, p.762-765 (2018)

Url : https://www.semanticscholar.org/paper/A-Method-for-Information-Grabbing%2C-Bypassing-and-Kumar-Pushpa/c488a73fffc8c5fefb89b10bc3a4205c44d0d231

Keywords : URL (Uniform Resource Locator), Google Dork, HTTP (Hyper Text transfer protocol, SQL (Structured Query Language), Open Web Application Security Project (OWASP), XSS (CRSOSS SITE SCRIPTING)

Campus : Mysuru

School : School of Arts and Sciences

Department : Computer Science

Year : 2018

Abstract : A single file on web contains text, images, audio, video and formatting instructions enclosed within a script. Website files are hosted on servers. The Servers “serve” those files to individual users upon request. Anonymous user with minimum user credentials can request on behalf of legitimate user to grab sensitive, confidential and personal information without legitimate users knowledge.[3] The proposed method makes use of URL as input for finding web vulnerabilities. Testing of proposed method is conducted to evaluate the performance based on the accuracy received. Performance is evaluated based on false negative and false positive results. Experiment is also conducted for web vulnerability assessment and penetration testing. The proposed method also checks for information grabbing from web using Google dork. Google dork helps to enter a network without permission and/or gain access to unauthorized information. Advanced search strings called Google dork queries used to locate sensitive information. This paper describes the method for web application vulnerabilities detection by using google dork, bypass first level security in any web and hack username and password in social networking site.

Cite this Research Publication : Santhosh Kumar B. J. and R., P. B., “A Method for Information Grabbing, Bypassing Security and Detecting Web Application Vulnerabilities”, International journal of engineering and technology, vol. 7, pp. 762-765, 2018.

Admissions Apply Now