Synopsis CYBER
Synopsis CYBER
On
Submitted by
1. Abstract
2. Introduction
3. Literature review
4. Objective
5. Research Methodology
6. Gantt chart
7. References
INTRODUCTION
Stefan Kals and team introduced the 'SecuBat' web vulnerability scanner tool,
offering a practical approach to identifying vulnerabilities in web applications.
Sushil Jajodia and Steven Noel introduced a Topological Vulnerability Analysis
approach, providing a methodology to analyze vulnerability interdependencies
and potential attack paths in computer networks. Christopher Kruegel et al.
presented a comprehensive study on "Execution after Redirect" vulnerabilities,
contributing to a deeper understanding of specific vulnerabilities and attack
vectors.
The VAPT life cycle, involves a meticulous nine-step process, including scoping,
reconnaissance, vulnerability assessment, penetration testing, privilege
escalation, result analysis, documentation, system restoration, and cleanup.
This structured approach ensures a thorough examination of potential
vulnerabilities and the development of actionable recommendations to
enhance system security.