SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Project Review - I
on
“Web Application Bug Finder”
Guided By : Prof.Ashwini
Taksal
JSPM’s
Bhivarabai Sawant Institute of Technology
& Research
Accredited with ‘B++’ Grade by NAAC
)
Mr.Satyadeep
Jagtap (
B190738529)
Mr.Rushikesh
Zende (-)
Department of Information Technology
Introduction
‱ Introduction
‱ Problem Statement
‱ Motivation
‱ Literature Survey
‱ Objectives
‱ Block Diagram
‱ Requirements
‱ Conclusion
Contents :
Introduction
➀ The Internet is a dangerous place! With great regularity, we hear about
websites becoming unavailable due to denial of service attacks, or displaying
modified (and often damaging) information on their homepages.
➀The purpose of website security is to prevent these (or any) sorts of attacks.
➀The more formal definition of website security is the act/practice of
protecting websites from unauthorized access, use, modification, destruction,
or disruption.
Problem Statement
➀ To identify the vulnerabilities of the website for the purpose of improving
the
security features and creating a blockchain based website.Website is made for
the
registration of the passport which contains the personal details of the
individual.
Attack is performed on the website which is created of our own using block
chain
Motivation
‱ The scope of the project to enhance the security of web applications.
‱ In this project bugs are found by automated process not by manually.
Literature Survey
Sr.
No
.
Paper Name Authors Publication Year Conclusion
1
Finding Bugs in
Web Applications
Using
Dynamic Test
Generation and
Explicit-State
Model Checking
Shay Artzi, Adam
Kiezun, Julian Dolby 2010
Web script crashes and malformed
dynamically generated webpages are
common errors, and they seriously impact
the
usability of Web applications. Current tools
for webpage validation cannot handle the
dynamically generated pages that are
ubiquitous
on today’s Internet
Web Security:
Research
Challenges and
Open Issuesg
V. Geetha &
Pranesh. V. Kallapur 2011
It has been observed for a quite long time
that Web Security has been one of hot
research areas, from point of view of be it
either analysis or detection and later
developing mitigation plans. Web security
threats have undergone much
sophistication compared to their initial
introduction and they are becoming more
& more evolved everyday.
Literature Survey
Paper Name Authors Publication Year Conclusion
3
A Study on Web
Application
Security and
Detecting
Security
Vulnerabilities
Sandeep Kumar
Renuka Mahajan
Naresh Kumar
Sunil Kumar Khatri
2017
The world is exceedingly reliant on the
Internet.
Nowadays, web security is biggest
challenge in the corporate
world. It is considered as the principle
framework for the
worldwide data society. Web applications
are prone to security
attacks.
4 A Framework for
Web Application
Vulnerability
Detection
Asra Kalim, C K Jha,
Deepak Singh Tomar,
Divya Rishi Sahu
2020
In today’s era one of the roles of web
applications is to
provide graphical user interface to the end
users for
communicating the devices through
internet. Development
and hosting of web application is too easy.
Hence, new
attack vectors are encountering frequently
to breach the end
user’s information.
Objectives
➀ Web Testing checks for functionality, usability, security, compatibility,
performance of the web application or website.
➀ During this stage issues such as that of web application security, the
functioning of the site, its access to handicapped as well as regular users
and its ability to handle traffic is checked
Block Diagram:-
Fig1. Block diagram of image processing
Hardware/Software
Requirements
Hardware Requirements :
Laptop
Software Requirements :
Python
Internet
Operating system :
Windows / Linux
Conclusion
‱ The study showed that Automated web application bug finding is easy
than manual process.
‱ It shows that it can reduce the time and human effots.

Thank You !!!

Weitere Àhnliche Inhalte

Ähnlich wie FinalProjectPresentation.ppt

Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxUsamaAli119043
 
The magnite ppt slides
The magnite ppt slidesThe magnite ppt slides
The magnite ppt slidesThe magnit
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testingEngr Md Yusuf Miah
 
A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...IJECEIAES
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)NAFCU Services Corporation
 
Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2Dallas Web Security Group
 
Web Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptxWeb Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptxEntertainmentMedley
 
Dallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security ThreatsDallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security ThreatsDallas Web Security Group
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Securityijtsrd
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Aditya K Sood
 
SuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-tSuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-tittiitti00
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docxyoroflowproduct
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Trainingpivotalsecurity
 

Ähnlich wie FinalProjectPresentation.ppt (20)

How to produce more secure web apps
How to produce more secure web appsHow to produce more secure web apps
How to produce more secure web apps
 
Proposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptxProposal Defense Presentation Template.pptx
Proposal Defense Presentation Template.pptx
 
The magnite ppt slides
The magnite ppt slidesThe magnite ppt slides
The magnite ppt slides
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
A hybrid framework for detecting structured query language injection attacks...
A hybrid framework for detecting structured query language  injection attacks...A hybrid framework for detecting structured query language  injection attacks...
A hybrid framework for detecting structured query language injection attacks...
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2Dallas websecuritygroup addressing-top-security-threats-v2
Dallas websecuritygroup addressing-top-security-threats-v2
 
Web Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptxWeb Investigation Through Penetration Tests.pptx
Web Investigation Through Penetration Tests.pptx
 
Dallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security ThreatsDallas Web Security Group - February Meeting - Addressing Top Security Threats
Dallas Web Security Group - February Meeting - Addressing Top Security Threats
 
XSS Finder for Web Application Security
XSS Finder for Web Application SecurityXSS Finder for Web Application Security
XSS Finder for Web Application Security
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
SuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-tSuperSec Bank-Cybersecurity Department-t
SuperSec Bank-Cybersecurity Department-t
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Ownux global Aug 2023.pdf
Ownux global Aug 2023.pdfOwnux global Aug 2023.pdf
Ownux global Aug 2023.pdf
 
WEB SECURITY
WEB SECURITYWEB SECURITY
WEB SECURITY
 
Secure Application Development Training
Secure Application Development TrainingSecure Application Development Training
Secure Application Development Training
 

KĂŒrzlich hochgeladen

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 

KĂŒrzlich hochgeladen (20)

"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

FinalProjectPresentation.ppt

  • 1. Project Review - I on “Web Application Bug Finder” Guided By : Prof.Ashwini Taksal JSPM’s Bhivarabai Sawant Institute of Technology & Research Accredited with ‘B++’ Grade by NAAC ) Mr.Satyadeep Jagtap ( B190738529) Mr.Rushikesh Zende (-) Department of Information Technology
  • 2. Introduction ‱ Introduction ‱ Problem Statement ‱ Motivation ‱ Literature Survey ‱ Objectives ‱ Block Diagram ‱ Requirements ‱ Conclusion Contents :
  • 3. Introduction ➀ The Internet is a dangerous place! With great regularity, we hear about websites becoming unavailable due to denial of service attacks, or displaying modified (and often damaging) information on their homepages. ➀The purpose of website security is to prevent these (or any) sorts of attacks. ➀The more formal definition of website security is the act/practice of protecting websites from unauthorized access, use, modification, destruction, or disruption.
  • 4. Problem Statement ➀ To identify the vulnerabilities of the website for the purpose of improving the security features and creating a blockchain based website.Website is made for the registration of the passport which contains the personal details of the individual. Attack is performed on the website which is created of our own using block chain
  • 5. Motivation ‱ The scope of the project to enhance the security of web applications. ‱ In this project bugs are found by automated process not by manually.
  • 6. Literature Survey Sr. No . Paper Name Authors Publication Year Conclusion 1 Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking Shay Artzi, Adam Kiezun, Julian Dolby 2010 Web script crashes and malformed dynamically generated webpages are common errors, and they seriously impact the usability of Web applications. Current tools for webpage validation cannot handle the dynamically generated pages that are ubiquitous on today’s Internet Web Security: Research Challenges and Open Issuesg V. Geetha & Pranesh. V. Kallapur 2011 It has been observed for a quite long time that Web Security has been one of hot research areas, from point of view of be it either analysis or detection and later developing mitigation plans. Web security threats have undergone much sophistication compared to their initial introduction and they are becoming more & more evolved everyday.
  • 7. Literature Survey Paper Name Authors Publication Year Conclusion 3 A Study on Web Application Security and Detecting Security Vulnerabilities Sandeep Kumar Renuka Mahajan Naresh Kumar Sunil Kumar Khatri 2017 The world is exceedingly reliant on the Internet. Nowadays, web security is biggest challenge in the corporate world. It is considered as the principle framework for the worldwide data society. Web applications are prone to security attacks. 4 A Framework for Web Application Vulnerability Detection Asra Kalim, C K Jha, Deepak Singh Tomar, Divya Rishi Sahu 2020 In today’s era one of the roles of web applications is to provide graphical user interface to the end users for communicating the devices through internet. Development and hosting of web application is too easy. Hence, new attack vectors are encountering frequently to breach the end user’s information.
  • 8. Objectives ➀ Web Testing checks for functionality, usability, security, compatibility, performance of the web application or website. ➀ During this stage issues such as that of web application security, the functioning of the site, its access to handicapped as well as regular users and its ability to handle traffic is checked
  • 9. Block Diagram:- Fig1. Block diagram of image processing
  • 10. Hardware/Software Requirements Hardware Requirements : Laptop Software Requirements : Python Internet Operating system : Windows / Linux
  • 11. Conclusion ‱ The study showed that Automated web application bug finding is easy than manual process. ‱ It shows that it can reduce the time and human effots.