This document discusses web application penetration testing. It explains that penetration testing helps identify vulnerabilities, determine how a system detects and defends attacks, finds the extent of successful attacks, and checks security policies and compliance. Penetration testing also helps prioritize security investments and identifies the most vulnerable routes. The document reviews tools like DVWA and OWASP for testing and Kali tools like Burp and sqlMap. It concludes by mentioning future scope and thanking the reader.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
145 views40 pages
WEB Pentesting - Update
This document discusses web application penetration testing. It explains that penetration testing helps identify vulnerabilities, determine how a system detects and defends attacks, finds the extent of successful attacks, and checks security policies and compliance. Penetration testing also helps prioritize security investments and identifies the most vulnerable routes. The document reviews tools like DVWA and OWASP for testing and Kali tools like Burp and sqlMap. It concludes by mentioning future scope and thanking the reader.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40
Cyber Security
Web Application Penetration Testing
Submitted By :- Roshan Singh Submitted To :- Prakash Meena
(Assistant Professor) Why we choose this project ? 1.Identifying vulnerabilities and testing those vulnerabilities 2.To determine how the system can detect and defend the attacks in a timely and proper manner 3.To find out the extent or size of a successful attack 4.All compliance protocols for data security are met 5.It helps to check whether security policies of a system or a company are truly effective or not 6.It can help to identify areas of security policy that are lacking 7.It identifies the most vulnerable or risk routes into your application or company. 8.It also helps to priorities any future security investment and helps developers to make fewer mistakes with the penetration reports. 9.With a penetration test, you can know the level of risk for your organization system compared to similar ones. Research and Survey Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. OWASP Broken Web Applications Project is a collection of vulnerable web applications that is distributed on a Virtual Machine. Kali Tools :- Burp Proxy , OwaspZed , sqlMap , Malteagoce , Weevely , Knock.py Future Scope and Conclusion WhoIsLookUp :- www.whois.domaintools.com WhoIsLookUp :- www.whois.domaintools.com Thank You……