0% found this document useful (0 votes)
145 views40 pages

WEB Pentesting - Update

This document discusses web application penetration testing. It explains that penetration testing helps identify vulnerabilities, determine how a system detects and defends attacks, finds the extent of successful attacks, and checks security policies and compliance. Penetration testing also helps prioritize security investments and identifies the most vulnerable routes. The document reviews tools like DVWA and OWASP for testing and Kali tools like Burp and sqlMap. It concludes by mentioning future scope and thanking the reader.

Uploaded by

Style
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views40 pages

WEB Pentesting - Update

This document discusses web application penetration testing. It explains that penetration testing helps identify vulnerabilities, determine how a system detects and defends attacks, finds the extent of successful attacks, and checks security policies and compliance. Penetration testing also helps prioritize security investments and identifies the most vulnerable routes. The document reviews tools like DVWA and OWASP for testing and Kali tools like Burp and sqlMap. It concludes by mentioning future scope and thanking the reader.

Uploaded by

Style
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

Cyber Security

Web Application Penetration Testing

Submitted By :- Roshan Singh Submitted To :- Prakash Meena


(Assistant Professor)
Why we choose this project ?
1.Identifying vulnerabilities and testing those vulnerabilities
2.To determine how the system can detect and defend the attacks in a timely
and proper manner
3.To find out the extent or size of a successful attack
4.All compliance protocols for data security are met
5.It helps to check whether security policies of a system or a company are truly
effective or not
6.It can help to identify areas of security policy that are lacking
7.It identifies the most vulnerable or risk routes into your application or
company.
8.It also helps to priorities any future security investment and helps developers
to make fewer mistakes with the penetration reports.
9.With a penetration test, you can know the level of risk for your organization
system compared to similar ones.
Research and Survey
 Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application
that is damn vulnerable. Its main goals are to be an aid for security
professionals to test their skills and tools in a legal environment,
help web developers better understand the processes of securing
web applications and aid teachers/students to teach/learn web
application security in a class room environment.
 OWASP Broken Web Applications Project is a collection of
vulnerable web applications that is distributed on a Virtual Machine.
 Kali Tools :- Burp Proxy , OwaspZed , sqlMap , Malteagoce , Weevely
, Knock.py
Future Scope and Conclusion
WhoIsLookUp :- www.whois.domaintools.com
WhoIsLookUp :- www.whois.domaintools.com
Thank You……

You might also like