Information Gathering on a Web Application deployed in Ruby on Rails

Authors

  • Bhardwaj H Department of Computer Science and Technology Maharaja Agrasen Institute of Technology, New Delhi, India
  • Aggarwal M Department of Computer Science and Technology Maharaja Agrasen Institute of Technology, New Delhi, India
  • Gupta N Department of Computer Science and Technology Maharaja Agrasen Institute of Technology, New Delhi, India

Keywords:

Penetration Testing, Ruby on Rails, Information Gathering

Abstract

In this world of providing effective interface to the user for accomplishing the requirements needed to perform information gathering for the purpose of implementing Penetration testing in a network we need an adaptive scenario of carrying out the same task. Ruby on Rails provides an interactive way of dealing with the user’s inputs. This kind of Web application allows a user to perform the basic information gathering, regarding possible threats in its network without having prior knowledge of Penetration testing.

References

An Overview of Penetration Testing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011

Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners, University of California, Santa Barbara

Improving penetration testing through static and dynamic analysis, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.450

State of the Art: Automated Black-Box Web Application Vulnerability Testing, Stanford University

PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010

Penetration Testing: Assessing Your Overall Security Before Attackers Do, SANS Institute InfoSec Reading Room

Arkin, B., Stender, S., McGraw, G. (2005). “Software Penetration Testing”, IEEE Security and Privacy, Volume 3, Issue 1

Network Penetration Testing and Research, Brandon F. Murphy North Carolina Agricultural and Technical State University, Greensboro, North Carolina, 27411

Ruby on Rails Tutorials 3rd Edition – Michael Hartl, 2nd Edition, Addison-Wesley Professional Ruby Series

Certified Ethical Hacker – Kimberly Graves, 1st Edition, Wiley Publising Inc.

Core Security Technologies, http://www.coresecurity.com/content/intro-pen-test

Hacking Articles by Raj Chandel, http://www.hackingarticles.in/

Downloads

Published

2025-11-11

How to Cite

[1]
H. Bhardwaj, M. Aggarwal, and N. Gupta, “Information Gathering on a Web Application deployed in Ruby on Rails”, Int. J. Comp. Sci. Eng., vol. 4, no. 1, pp. 66–69, Nov. 2025.