Session
Computer Science and Communication Engineering
Description
With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.
Keywords:
bugs, Information Security, security researchers, hackers, websites, vulnerabilities
Proceedings Editor
Edmond Hajrizi
ISBN
978-9951-550-14-7
First Page
131
Last Page
134
Location
Durres, Albania
Start Date
7-11-2015 9:00 AM
End Date
7-11-2015 5:00 PM
DOI
10.33107/ubt-ic.2015.101
Recommended Citation
Abazi, Tanzer; Hoxhaj, Mentor; Hajrizi, Edmond; and Krasniqi, Gazmend, "Bounty techniques for web vulnerability scanning" (2015). UBT International Conference. 101.
https://knowledgecenter.ubt-uni.net/conference/2015/all-events/101
Bounty techniques for web vulnerability scanning
Durres, Albania
With the advancement of technology and the raising of massive amount of data, the used techniques for data security are continually a challenge. This paper contributes on identifying the gaps and evaluating security level on web portals hosted or managed by Republic of Kosovo institutions or businesses, whose data privacy and security could be a big business concern. The results have been obtained from real case scenario, where 25 security researchers have contributed in white hack activities. These activities, were part of a one day conference called. “The DAY when hacking is legal”, held in Pristine.