Information Gathering on a Web Application deployed in Ruby on Rails
Keywords:
Penetration Testing, Ruby on Rails, Information GatheringAbstract
In this world of providing effective interface to the user for accomplishing the requirements needed to perform information gathering for the purpose of implementing Penetration testing in a network we need an adaptive scenario of carrying out the same task. Ruby on Rails provides an interactive way of dealing with the user’s inputs. This kind of Web application allows a user to perform the basic information gathering, regarding possible threats in its network without having prior knowledge of Penetration testing.
References
An Overview of Penetration Testing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners, University of California, Santa Barbara
Improving penetration testing through static and dynamic analysis, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.450
State of the Art: Automated Black-Box Web Application Vulnerability Testing, Stanford University
PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010
Penetration Testing: Assessing Your Overall Security Before Attackers Do, SANS Institute InfoSec Reading Room
Arkin, B., Stender, S., McGraw, G. (2005). “Software Penetration Testing”, IEEE Security and Privacy, Volume 3, Issue 1
Network Penetration Testing and Research, Brandon F. Murphy North Carolina Agricultural and Technical State University, Greensboro, North Carolina, 27411
Ruby on Rails Tutorials 3rd Edition – Michael Hartl, 2nd Edition, Addison-Wesley Professional Ruby Series
Certified Ethical Hacker – Kimberly Graves, 1st Edition, Wiley Publising Inc.
Core Security Technologies, http://www.coresecurity.com/content/intro-pen-test
Hacking Articles by Raj Chandel, http://www.hackingarticles.in/
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
