DeepAI
Log In Sign Up

Robin: A Web Security Tool

07/13/2020
by   Guilherme Girotto, et al.
0

Thanks to the advance of technology, all kinds of applications are becoming more complete and capable of performing complex tasks that save much of our time. But to perform these tasks, applications require that some personal information are shared, for example credit card, bank accounts, email addresses, etc. All these data must be transferred securely between the final user and the institution application. Nonetheless, several applications might contain residual flaws that may be explored by criminals in order to steal users data. Hence, to help information security professionals and developers to perform penetration tests (pentests) on web applications, this paper presents Robin: A Web Security Tool. The tool is also applied to a real case study in which a very dangerous vulnerability was found. This vulnerability is also described in this paper.

READ FULL TEXT

page 2

page 7

page 8

page 9

01/14/2019

BlackWatch: Increasing Attack Awareness Within Web Applications

Web applications are relied upon by many for the services they provide. ...
01/09/2023

Quantifying User Password Exposure to Third-Party CDNs

Web services commonly employ Content Distribution Networks (CDNs) for pe...
11/04/2018

Web Security Investigation through Penetration Tests: A Case study of an Educational Institution Portal

Web security has become an important subject; many companies and organiz...
01/23/2023

Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing

APIs often transmit far more data to client applications than they need,...
11/07/2017

Detection of Wordpress Content Injection Vulnerability

The popularity of content management software (CMS) is growing vastly to...
12/21/2020

A Vulnerability Study on Academic Collaboration Networks Based on Network Dynamics

Researchers that work for the same institution use their email as the ma...
12/20/2019

Pentest on an Internet Mobile App: A Case Study using Tramonto

Mobile applications are used to handle different types of data. Commonly...