Session

Information Systems and Security

Description

A web application is an application that is accessed by users over a network such as the internet or intranet. The term also refers an application that is coded in a browser-supported programming language and reliant on a common web browser to render the application executable. Web applications are vulnerable to varies exploits from those which manipulate the application via its graphical web interface (HTTP exploits), to tampering the Uniform Resource Identifier (URI) or tampering HTTPS elements not contained in the URI. Getting started from the accessibility and the variety of exploits, the security assessment is a necessity for providing protected data and secure navigation through the web application. In this paper we will present a case study for security assessment of a web application and also will insert our scrip to a web application as an example of a cross site scripting exploitation.

Keywords:

Security, Web application, Exploit, Cross site

Session Chair

Naim Preniqi

Session Co-Chair

Blerton Abazi

Proceedings Editor

Edmond Hajrizi

ISBN

978-9951-437-60-8

First Page

101

Last Page

106

Location

Durres, Albania

Start Date

28-10-2017 4:00 PM

End Date

28-10-2017 5:30 PM

DOI

10.33107/ubt-ic.2017.189

Share

COinS
 
Oct 28th, 4:00 PM Oct 28th, 5:30 PM

Security Assessment of Web Applications

Durres, Albania

A web application is an application that is accessed by users over a network such as the internet or intranet. The term also refers an application that is coded in a browser-supported programming language and reliant on a common web browser to render the application executable. Web applications are vulnerable to varies exploits from those which manipulate the application via its graphical web interface (HTTP exploits), to tampering the Uniform Resource Identifier (URI) or tampering HTTPS elements not contained in the URI. Getting started from the accessibility and the variety of exploits, the security assessment is a necessity for providing protected data and secure navigation through the web application. In this paper we will present a case study for security assessment of a web application and also will insert our scrip to a web application as an example of a cross site scripting exploitation.