Abstract

A single file on web contains text, images, audio, video and formatting instructions enclosed within a script. Website files are hosted on servers. The Servers “serve” those files to individual users upon request. Anonymous user with minimum user credentials can request on behalf of legitimate user to grab sensitive, confidential and personal information without legitimate users knowledge.[3] The proposed method makes use of URL as input for finding web vulnerabilities. Testing of proposed method is conducted to evaluate the performance based on the accuracy received. Performance is evaluated based on false negative and false positive results. Experiment is also conducted for web vulnerability assessment and penetration testing. The proposed method also checks for information grabbing from web using Google dork. Google dork helps to enter a network without permission and/or gain access to unauthorized information. Advanced search strings called Google dork queries used to locate sensitive information. This paper describes the method for web application vulnerabilities detection by using google dork, bypass first level security in any web and hack username and password in social networking site.

Highlights

  • Web browser is a software application using which we can perform most of the internet-based activities

  • Images, audio, video and formatting instructions enclosed within a web script

  • The proposed method checks for information grabbing from web using Google dork

Read more

Summary

Introduction

Web browser is a software application using which we can perform most of the internet-based activities. Many web applications provide extensions to browsers to enhance their functionality, while some of the extensions perform malicious activities to get access to the sensitive data without the user’s knowledge [3]. The application makes use of accepting URL as input and detects vulnerabilities in websites. The application will grab sensitive, confidential and personal information without legitimate users knowledge and detecting a method for hacking username and password in social networking site. 2. Proposed system (i) Web vulnerabilities detection (ii) Bypass first level security in website (iii) Web content vulnerability The data is stored on to web servers in different formats. An untrusted data is breakdown into parts and combined with actual application This makes an injection problems very difficult to identify. The proposed method finds Web vulnerabilities detection by accepting URL as input.

Methodology
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call