[go: up one dir, main page]

Bijjou, 2019 - Google Patents

Web Application Firewall Bypassing: An Approach for Penetra

Bijjou, 2019

Document ID
4138142738727483089
Author
Bijjou K
Publication year
Publication venue
In Depth Security Vol. III: Proceedings of the DeepSec Conferences

External Links

Snippet

In order to facilitate this approach a tool has been developed. The outcomes of this tool have significantly contributed to finding multiple bypasses. These bypasses will be reported to the particular Web Application Firewall vendors and will presumably improve the security level …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
EP3188436B1 (en) Platform for protecting small and medium enterprises from cyber security threats
US10764313B1 (en) Method and system for protection against network-based cyber threats
US8800042B2 (en) Secure web application development and execution environment
Stasinopoulos et al. Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications
US20150121532A1 (en) Systems and methods for defending against cyber attacks at the software level
US10313370B2 (en) Generating malware signatures based on developer fingerprints in debug information
Riadi et al. Vulnerability analysis of E-voting application using open web application security project (OWASP) framework
Calzavara et al. Testing for integrity flaws in web sessions
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Gandikota et al. Web application security through comprehensive vulnerability assessment
Sharif Web attacks analysis and mitigation techniques
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Djeki et al. Preventive measures for digital learning spaces’ security issues
Tkachenko et al. Enhancing Front‐End Security: Protecting User Data and Privacy in Web Applications
Tyler et al. Towards Browser Controls to Protect Cookies from Malicious Extensions
Orucho et al. Security threats affecting user-data on transit in mobile banking applications: A review
MEHARU WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING)
Bijjou Web Application Firewall Bypassing: An Approach for Penetra
Nilsson et al. Vulnerability scanners
Sheikh Certified Ethical Hacker (CEH) Preparation Guide
Pradhana Website Security Analysis Using the OWASP10 Method (Case Study: almumtazparfumebatam. store)
Yu et al. Trustworthy web services based on testing
Bypassing Magdeburger Journal zur Sicherheitsforschung
Ackerman Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization
Bernardo Targeted attack detection by means of free and open source solutions