A review: Penetration testing approaches on content management system (cms)
RS Jagamogan, SA Ismail, N Hafizah… - 2021 7th International …, 2021 - ieeexplore.ieee.org
These days, Content Management Systems (CMS) have been the target for adversaries in
the cyber world since they are mostly open-source like Drupal, Joomla and WordPress …
the cyber world since they are mostly open-source like Drupal, Joomla and WordPress …
[PDF][PDF] Broken authentication and session management vulnerability: a case study of web application
Web applications have extensively taken over the roles of atomization and enhancement of
prevailing solutions. It also provides different services to the multiple users of the application …
prevailing solutions. It also provides different services to the multiple users of the application …
[PDF][PDF] Penetration testing using Kali linux: SQL injection, XSS, wordpres, and WPA2 attacks
TS Gunawan, MK Lim, M Kartiwi, NA Malik… - Indonesian Journal of …, 2018 - academia.edu
Nowadays, computers, smart phones, smart watches, printers, projectors, washing
machines, fridges, and other mobile devices connected to Internet are exposed to various …
machines, fridges, and other mobile devices connected to Internet are exposed to various …
Where do Databases and Digital Forensics meet? A Comprehensive Survey and Taxonomy
DB Seufitelli, MA Brandão, ACA Fernandes… - ACM SIGMOD …, 2023 - dl.acm.org
We present a systematic literature review and propose a taxonomy for research at the
intersection of Digital Forensics and Databases. The merge between these two areas has …
intersection of Digital Forensics and Databases. The merge between these two areas has …
RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh
People nowadays cannot think of even a single moment without the internet. Doubtlessly,
web applications are currently the key to all change in the world. The features and facilities …
web applications are currently the key to all change in the world. The features and facilities …
Measuring vulnerabilities of bangladeshi websites
M Moniruzzaman, F Chowdhury… - … on Electrical, Computer …, 2019 - ieeexplore.ieee.org
No web application is without the risk of exploits and fully infallible. Even so, web services
have been integrated into our daily lives in such a way that we have been accustomed to …
have been integrated into our daily lives in such a way that we have been accustomed to …
[PDF][PDF] SAISAN: an automated local file inclusion vulnerability detection model
Communicating and delivering services to the consumers through web applications are now
become very popular due to its user friendly interface, global accessibility, and easy …
become very popular due to its user friendly interface, global accessibility, and easy …
[PDF][PDF] Security Analysis of Government & Financial Websites of Bangladesh
MA Masum, MRI Sachcha, A Nayem - Int. J. Educ. Manag. Eng., 2022 - researchgate.net
The vision 2021 of Bangladesh had to transform into a digital country, where the digital
platform was a significant part of it. To make a digital platform, the Bangladesh government …
platform was a significant part of it. To make a digital platform, the Bangladesh government …
Intrusion detection systems for mitigating sql injection attacks: review and state-of-practice
RF Silva, R Barbosa, J Bernardino - International Journal of …, 2020 - igi-global.com
Databases are widely used by organizations to store business-critical information, which
makes them one of the most attractive targets for security attacks. SQL Injection is the most …
makes them one of the most attractive targets for security attacks. SQL Injection is the most …
ADT-SQLi: An Automated Detection of SQL Injection Vulnerability in Web Applications
Web applications are constantly being developed to make life easier and more convenient
for businesses and customers; it makes intruders involved in conducting malicious activities …
for businesses and customers; it makes intruders involved in conducting malicious activities …