We propose Web Based Automated Vulnerability Application/scanner which will detect 5 different types of vulnerabilities like Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), SQLI Injection, Remote Code Execution (RCE) and Man In The Middle Attack (MITM) with detection of IP Poising and
Red Python Web Automated Vulnerability Scanner
We propose Web Based Automated Vulnerability Application/scanner which will detect 5 different types of vulnerabilities like Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), SQLI Injection, Remote Code Execution (RCE) and Man In The Middle Attack (MITM) with detection of IP Poising and Address Resolution Protocol (ARP) Spoofing techniques. We will make a Website in which Pen-tester (Security Researcher) can check the vulnerability of their desired Website by just entering the DNS or IP address, our system will tell either the targeted Website is vulnerable or not, if vulnerability found then a Pop up message will be displayed on the Website screen as pop up message with all the details of vulnerabilities about that target WebsiteWe propose Web Based Automated Vulnerability Application/scanner which will detect 5 different types of vulnerabilities like Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), SQLI Injection, Remote Code Execution (RCE) and Man In The Middle Attack (MITM) with detection of IP Poising and Address Resolution Protocol (ARP) Spoofing techniques. We will make a Website in which Pen-tester (Security Researcher) can check the vulnerability of their desired Website by just entering the DNS or IP address, our system will tell either the targeted Website is vulnerable or not, if vulnerability found then a Pop up message will be displayed on the Website screen as pop up message with all the details of vulnerabilities about that target WebsiteWe propose Web Based Automated Vulnerability Application/scanner which will detect 5 different types of vulnerabilities like Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), SQLI Injection, Remote Code Execution (RCE) and Man In The Middle Attack (MITM) with detection of IP Poising and Address Resolution Protocol (ARP) Spoofing techniques. We will make a Website in which Pen-tester (Security Researcher) can check the vulnerability of their desired Website by just entering the DNS or IP address, our system will tell either the targeted Website is vulnerable or not, if vulnerability found then a Pop up message will be displayed on the Website screen as pop up message.
“To design Web based automated vulnerability scanner to detect and find the vulnerability in the Websites.”
1 Pen tester will first sign up and get itself registered before using the services to find vulnerabilities. After then pen tester will log in to the Web based Vulnerability Scanner to access the available tools for finding vulnerabilities according to its own choice. There are total of six tool in the Web Base Vulnerability Scanner which we mentioned above, user can select any of the tool, every tool has its own functions.
If pen tester selects SQLI injection, pen tester has to provide IP/DNS of the target Website to find vulnerabilities then the system will do processing and after then displayed a message on the Website related to the vulnerabilities about that Website, message will be displayed as well either the Website is non vulnerable.
If pen tester selects any of the tool (XSS, CSRF, RCE, IP spoofing, ARP spoofing) he have to provide IP/DNS of the target Website to find vulnerabilities. Then the corresponding selected tool will give response in term of displaying message on the Website about the detail of the vulnerabilities about the target Website.
Final Delierable will be WebApplication which will host on server. Automated Scanner will integrate with web application through API's.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| API's | Miscellaneous | 1 | 10000 | 10000 |
| Fuzzer | Equipment | 1 | 70000 | 70000 |
| Total in (Rs) | 80000 |
In this project, designing, fabrication, and testing of the electric bike will be carried...
Power inverters are devices that can convert electrical energy from DC form into AC form a...
The work presented in this document is the communication link between the normal person an...
The Adaptive Assessment System (AAS) is an inviting and engaging web-platform for preparat...
Exploration of Web Image Search Results is an online web based tool designed for expl...