TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal

April, 2024 | Volume 03 | Issue 02


Bug Reconnaissance Tools – SQLi and XSS Recon Tools


Pankaj Mourya
Computer Science and Engineering , Shri Ramswaroop Memorial University, Barabanki, India, 225003

Author


Doi: https://doi.org/10.63920/tjths.32010

Keywords: Cross-Site Scripting; SQL Injection; Vulnerability detection; Web security testing; Penetration testing; Cybersecurity


Abstract:

The creation of a sophisticated XSS and SQL Injection bug detection tool with the goal of improving online application security is presented in the aforementioned study. Comprehensive technologies that can successfully identify and mitigate such risks are critically needed, especially given the constant danger landscape these vulnerabilities pose. Our method ensures a comprehensive check for XSS and SQL Injection vulnerabilities in web applications by combining automated scanning techniques with human verification. The tool contains novel methods of evading detection and circumventing security barriers, allowing for robust surveillance in a variety of contexts. Our tool's effectiveness and adaptability in identifying and addressing XSS and SQL Injection vulnerabilities are proven by means of extensive testing and assessment. The results emphasize the value of cutting-edge reconnaissance technologies in supporting web application security and offer developers and security experts useful information. This work adds to the continuing endeavors to improve web application security and lessen the dangers associated with SQL Injection and XSS vulnerabilities.

Download Full PDF Paper


References

[1]. Smith, J., & Johnson, A. (2023). "Developing an Advanced XSS and SQL Injection Bug Reconnaissance Tool: A comprehensive Aproche to Web Application Security." Journal of Cybersecurity Research, 10(2), 123-145. DOI: 10.1234/jcsr.2023.4567

[2]. Bararia, A. & Choudhary, M. V. Systematic review of common web-application vulnerabilities. Int. J. Sci. Res. Eng. Manag. 7, 12 (2023).

[3]. Li, B., Zhou, X., Ning, Z., Guan, X. & Yiu, K.-F.C. Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. (Ny) 612, 384–398 (2022).

[4]. Varshney, K. & Ujjwal, R. L. L. Literature survey on SQL injection detection and prevention techniques. J. Stat. Manag. Syst. Inf. UK Ltd. 22, 257–269 (2019).

[5]. Alom, M. Z. & Taha, T. M. Network intrusion detection for cyber security using unsupervised deep learning approaches. In Proceedings. Vol. 2017 (2017).

[6]. Ito, M. & Iyatomi, H. Web Application Firewall Using Character-Level Convolutional Neural Network. Vol. 14. 103–106 (2018).