Open Access   Article Go Back

Information Gathering on a Web Application deployed in Ruby on Rails

Harsh Bhardwaj1 , Manish Aggarwal2 , Neha Gupta3

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-1 , Page no. 60-69, Jan-2016

Online published on Jan 31, 2016

Copyright © Harsh Bhardwaj, Manish Aggarwal, Neha Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta, “Information Gathering on a Web Application deployed in Ruby on Rails,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.1, pp.60-69, 2016.

MLA Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta "Information Gathering on a Web Application deployed in Ruby on Rails." International Journal of Computer Sciences and Engineering 4.1 (2016): 60-69.

APA Style Citation: Harsh Bhardwaj, Manish Aggarwal, Neha Gupta, (2016). Information Gathering on a Web Application deployed in Ruby on Rails. International Journal of Computer Sciences and Engineering, 4(1), 60-69.

BibTex Style Citation:
@article{Bhardwaj_2016,
author = {Harsh Bhardwaj, Manish Aggarwal, Neha Gupta},
title = {Information Gathering on a Web Application deployed in Ruby on Rails},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2016},
volume = {4},
Issue = {1},
month = {1},
year = {2016},
issn = {2347-2693},
pages = {60-69},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=782},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=782
TI - Information Gathering on a Web Application deployed in Ruby on Rails
T2 - International Journal of Computer Sciences and Engineering
AU - Harsh Bhardwaj, Manish Aggarwal, Neha Gupta
PY - 2016
DA - 2016/01/31
PB - IJCSE, Indore, INDIA
SP - 60-69
IS - 1
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1508 1448 downloads 1502 downloads
  
  
           

Abstract

In this world of providing effective interface to the user for accomplishing the requirements needed to perform information gathering for the purpose of implementing Penetration testing in a network we need an adaptive scenario of carrying out the same task. Ruby on Rails provides an interactive way of dealing with the user’s inputs. This kind of Web application allows a user to perform the basic information gathering, regarding possible threats in its network without having prior knowledge of Penetration testing.

Key-Words / Index Term

Penetration Testing, Ruby on Rails, Information Gathering

References

[1] An Overview of Penetration Testing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
[2] Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners, University of California, Santa Barbara
[3] Improving penetration testing through static and dynamic analysis, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/stvr.450
[4] State of the Art: Automated Black-Box Web Application Vulnerability Testing, Stanford University
[5] PENETRATION TESTING AND VULNERABILITY ASSESSMENTS: A PROFESSIONAL APPROACH, Published in the Proceedings of the 1st International Cyber Resilience Conference, Edith Cowan University, Perth Western Australia, 23rd August 2010
[6] Penetration Testing: Assessing Your Overall Security Before Attackers Do, SANS Institute InfoSec Reading Room
[7] Arkin, B., Stender, S., McGraw, G. (2005). “Software Penetration Testing”, IEEE Security and Privacy, Volume 3, Issue 1
[8] Network Penetration Testing and Research, Brandon F. Murphy North Carolina Agricultural and Technical State University, Greensboro, North Carolina, 27411
[9] Ruby on Rails Tutorials 3rd Edition – Michael Hartl, 2nd Edition, Addison-Wesley Professional Ruby Series
[10] Certified Ethical Hacker – Kimberly Graves, 1st Edition, Wiley Publising Inc.
[11] Core Security Technologies, http://www.coresecurity.com/content/intro-pen-test
[12] Hacking Articles by Raj Chandel, http://www.hackingarticles.in/