A review: Penetration testing approaches on content management system (cms)

RS Jagamogan, SA Ismail, N Hafizah… - 2021 7th International …, 2021 - ieeexplore.ieee.org
These days, Content Management Systems (CMS) have been the target for adversaries in
the cyber world since they are mostly open-source like Drupal, Joomla and WordPress …

[PDF][PDF] Broken authentication and session management vulnerability: a case study of web application

MM Hassan, SS Nipa, M Akter, R Haque… - Int. J. Simul. Syst. Sci …, 2018 - ijssst.info
Web applications have extensively taken over the roles of atomization and enhancement of
prevailing solutions. It also provides different services to the multiple users of the application …

[PDF][PDF] Penetration testing using Kali linux: SQL injection, XSS, wordpres, and WPA2 attacks

TS Gunawan, MK Lim, M Kartiwi, NA Malik… - Indonesian Journal of …, 2018 - academia.edu
Nowadays, computers, smart phones, smart watches, printers, projectors, washing
machines, fridges, and other mobile devices connected to Internet are exposed to various …

Where do Databases and Digital Forensics meet? A Comprehensive Survey and Taxonomy

DB Seufitelli, MA Brandão, ACA Fernandes… - ACM SIGMOD …, 2023 - dl.acm.org
We present a systematic literature review and propose a taxonomy for research at the
intersection of Digital Forensics and Databases. The merge between these two areas has …

RFI and SQLi based local file inclusion vulnerabilities in web applications of Bangladesh

A Begum, MM Hassan, T Bhuiyan… - 2016 International …, 2016 - ieeexplore.ieee.org
People nowadays cannot think of even a single moment without the internet. Doubtlessly,
web applications are currently the key to all change in the world. The features and facilities …

Measuring vulnerabilities of bangladeshi websites

M Moniruzzaman, F Chowdhury… - … on Electrical, Computer …, 2019 - ieeexplore.ieee.org
No web application is without the risk of exploits and fully infallible. Even so, web services
have been integrated into our daily lives in such a way that we have been accustomed to …

[PDF][PDF] SAISAN: an automated local file inclusion vulnerability detection model

MM Hassan, T Bhuyian, MK Sohel… - … of Engineering & …, 2018 - researchgate.net
Communicating and delivering services to the consumers through web applications are now
become very popular due to its user friendly interface, global accessibility, and easy …

[PDF][PDF] Security Analysis of Government & Financial Websites of Bangladesh

MA Masum, MRI Sachcha, A Nayem - Int. J. Educ. Manag. Eng., 2022 - researchgate.net
The vision 2021 of Bangladesh had to transform into a digital country, where the digital
platform was a significant part of it. To make a digital platform, the Bangladesh government …

Intrusion detection systems for mitigating sql injection attacks: review and state-of-practice

RF Silva, R Barbosa, J Bernardino - International Journal of …, 2020 - igi-global.com
Databases are widely used by organizations to store business-critical information, which
makes them one of the most attractive targets for security attacks. SQL Injection is the most …

ADT-SQLi: An Automated Detection of SQL Injection Vulnerability in Web Applications

MM Hassan, R Risha, A Esha - … of International Conference on Frontiers in …, 2022 - Springer
Web applications are constantly being developed to make life easier and more convenient
for businesses and customers; it makes intruders involved in conducting malicious activities …