Call for Papers
Quick Links
April, 2024 | Volume 03 | Issue 02
Bug Reconnaissance Tools – SQLi and XSS Recon Tools
Pankaj Mourya
Computer Science and Engineering , Shri Ramswaroop Memorial University, Barabanki, India, 225003
Author
Doi: https://doi.org/10.63920/tjths.32010
Keywords: Cross-Site Scripting; SQL Injection; Vulnerability detection; Web security testing; Penetration testing; Cybersecurity
Abstract:
The creation of a sophisticated XSS and SQL Injection bug detection tool with the goal of improving online application security is presented in the aforementioned study. Comprehensive technologies that can successfully identify and mitigate such risks are critically needed, especially given the constant danger landscape these vulnerabilities pose. Our method ensures a comprehensive check for XSS and SQL Injection vulnerabilities in web applications by combining automated scanning techniques with human verification. The tool contains novel methods of evading detection and circumventing security barriers, allowing for robust surveillance in a variety of contexts. Our tool's effectiveness and adaptability in identifying and addressing XSS and SQL Injection vulnerabilities are proven by means of extensive testing and assessment. The results emphasize the value of cutting-edge reconnaissance technologies in supporting web application security and offer developers and security experts useful information. This work adds to the continuing endeavors to improve web application security and lessen the dangers associated with SQL Injection and XSS vulnerabilities.
Download Full PDF Paper
References
[1]. Smith, J., & Johnson, A. (2023). "Developing an Advanced XSS and SQL Injection Bug Reconnaissance Tool: A comprehensive Aproche to Web Application Security." Journal of Cybersecurity Research, 10(2), 123-145. DOI: 10.1234/jcsr.2023.4567
[2]. Bararia, A. & Choudhary, M. V. Systematic review of common web-application vulnerabilities. Int. J. Sci. Res. Eng. Manag. 7, 12 (2023).
[3]. Li, B., Zhou, X., Ning, Z., Guan, X. & Yiu, K.-F.C. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. (Ny) 612, 384–398 (2022).
[4]. Varshney, K. & Ujjwal, R. L. L. Literature survey on SQL injection detection and prevention techniques. J. Stat. Manag. Syst. Inf. UK Ltd. 22, 257–269 (2019).
[5]. Alom, M. Z. & Taha, T. M. Network intrusion detection for cyber security using unsupervised deep learning approaches. In Proceedings. Vol. 2017 (2017).
[6]. Ito, M. & Iyatomi, H. Web Application Firewall Using Character-Level Convolutional Neural Network. Vol. 14. 103–106 (2018).
