Bijjou, 2019 - Google Patents
Web Application Firewall Bypassing: An Approach for PenetraBijjou, 2019
- Document ID
- 4138142738727483089
- Author
- Bijjou K
- Publication year
- Publication venue
- In Depth Security Vol. III: Proceedings of the DeepSec Conferences
External Links
Snippet
In order to facilitate this approach a tool has been developed. The outcomes of this tool have significantly contributed to finding multiple bypasses. These bypasses will be reported to the particular Web Application Firewall vendors and will presumably improve the security level …
- 230000035515 penetration 0 description 31
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3188436B1 (en) | Platform for protecting small and medium enterprises from cyber security threats | |
US10764313B1 (en) | Method and system for protection against network-based cyber threats | |
US8800042B2 (en) | Secure web application development and execution environment | |
Stasinopoulos et al. | Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications | |
US20150121532A1 (en) | Systems and methods for defending against cyber attacks at the software level | |
US10313370B2 (en) | Generating malware signatures based on developer fingerprints in debug information | |
Riadi et al. | Vulnerability analysis of E-voting application using open web application security project (OWASP) framework | |
Calzavara et al. | Testing for integrity flaws in web sessions | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Gandikota et al. | Web application security through comprehensive vulnerability assessment | |
Sharif | Web attacks analysis and mitigation techniques | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Djeki et al. | Preventive measures for digital learning spaces’ security issues | |
Tkachenko et al. | Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications | |
Tyler et al. | Towards Browser Controls to Protect Cookies from Malicious Extensions | |
Orucho et al. | Security threats affecting user-data on transit in mobile banking applications: A review | |
MEHARU | WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING) | |
Bijjou | Web Application Firewall Bypassing: An Approach for Penetra | |
Nilsson et al. | Vulnerability scanners | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
Pradhana | Website Security Analysis Using the OWASP10 Method (Case Study: almumtazparfumebatam. store) | |
Yu et al. | Trustworthy web services based on testing | |
Bypassing | Magdeburger Journal zur Sicherheitsforschung | |
Ackerman | Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization | |
Bernardo | Targeted attack detection by means of free and open source solutions |