Information Gathering on a Web Application deployed in Ruby on Rails
Harsh Bhardwaj1 , Manish Aggarwal2 , Neha Gupta3
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-1 , Page no. 60-69, Jan-2016
Online published on Jan 31, 2016
Copyright © Harsh Bhardwaj, Manish Aggarwal, Neha Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta, “Information Gathering on a Web Application deployed in Ruby on Rails,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.60-69, 2016.
MLA Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta "Information Gathering on a Web Application deployed in Ruby on Rails." International Journal of Computer Sciences and Engineering 4.1 (2016): 60-69.
APA Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta, (2016). Information Gathering on a Web Application deployed in Ruby on Rails. International Journal of Computer Sciences and Engineering, 4(1), 60-69.
BibTex Style Citation:
@article{Bhardwaj_2016,
author = {Harsh Bhardwaj, Manish Aggarwal, Neha Gupta},
title = {Information Gathering on a Web Application deployed in Ruby on Rails},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2016},
volume = {4},
Issue = {1},
month = {1},
year = {2016},
issn = {2347-2693},
pages = {60-69},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=782},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=782
TI - Information Gathering on a Web Application deployed in Ruby on Rails
T2 - International Journal of Computer Sciences and Engineering
AU - Harsh Bhardwaj, Manish Aggarwal, Neha Gupta
PY - 2016
DA - 2016/01/31
PB - IJCSE, Indore, INDIA
SP - 60-69
IS - 1
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1552 | 1484 downloads | 1575 downloads |
Abstract
In this world of providing effective interface to the user for accomplishing the requirements needed to perform information gathering for the purpose of implementing Penetration testing in a network we need an adaptive scenario of carrying out the same task. Ruby on Rails provides an interactive way of dealing with the user’s inputs. This kind of Web application allows a user to perform the basic information gathering, regarding possible threats in its network without having prior knowledge of Penetration testing.
Key-Words / Index Term
Penetration Testing, Ruby on Rails, Information Gathering
References
[1] An Overview of Penetration Testing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
[2] Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners, University of California, Santa Barbara
[3] Improving penetration testing through static and dynamic analysis, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.450
[4] State of the Art: Automated Black-Box Web Application Vulnerability Testing, Stanford University
[5] PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010
[6] Penetration Testing: Assessing Your Overall Security Before Attackers Do, SANS Institute InfoSec Reading Room
[7] Arkin, B., Stender, S., McGraw, G. (2005). “Software Penetration Testing”, IEEE Security and Privacy, Volume 3, Issue 1
[8] Network Penetration Testing and Research, Brandon F. Murphy North Carolina Agricultural and Technical State University, Greensboro, North Carolina, 27411
[9] Ruby on Rails Tutorials 3rd Edition – Michael Hartl, 2nd Edition, Addison-Wesley Professional Ruby Series
[10] Certified Ethical Hacker – Kimberly Graves, 1st Edition, Wiley Publising Inc.
[11] Core Security Technologies, http://www.coresecurity.com/content/intro-pen-test
[12] Hacking Articles by Raj Chandel, http://www.hackingarticles.in/