Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015
Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications which allows the attackers to inject malicious script into web pages/servers. XSS is the main cause of DOM attack. This add-on is a penetration testing tool to detect DOM vulnerabilities in Web Applications. This tool detects the DOM vulnerabilities based on xss vulnerabilities in the web page. It provides a penetration tester the ability to test all kinds of xss vulnerabilities. This add-on will be useful for web application developers in detecting DOM vulnerabilities early in the development process will help protect a web application from unnecessary flaws.
Keywords: Vulnerability Testing, Cross-site scripting, Web Applications, Security, Code Insertion,
Edition: Volume 4 Issue 4, April 2015
Pages: 1635 - 1639
How to Cite this Article?
Saranraj Ilangovan, Geogen George, "Developing Firefox add-on for DOM vulnerability Assessment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153449, Volume 4 Issue 4, April 2015, 1635 - 1639
108 PDF Views | 73 PDF Downloads
Similar Articles with Keyword 'Vulnerability Testing'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 636 - 640Exploit Development Research on x86 Windows Application: Buffer Overflow
Geogen George, Sivasundaram R
Similar Articles with Keyword 'Cross-site scripting'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1274 - 1277Automation of Mutated Cross Site Scripting
Anchal Tiwari, J. Jeysree
Similar Articles with Keyword 'Web Applications'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 2032 - 2036A Survey on CAPTCHA as Graphical Password
Priti P. Doke, S.A Nagtilak
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 1160 - 1163Dynamic Application Development for Web Application Process
Saranya Seera, Y. Sangeetha
Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1904 - 1907Web Testing: A Review on Tool, Challenges and Techniques
Jyoti
Research Paper, Information Technology, Indonesia, Volume 8 Issue 7, July 2019
Pages: 1228 - 1234Accountability of Course Graduation Records using Permissioned Blockchain in Hyperledger Fabric
Linda Handayani, Avinanta Tarigan
Similar Articles with Keyword 'Security'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 607 - 611A Survey Based on Fingerprint Recognition - Minutiae
Annapoorani. D, Caroline Viola Stella Mery. M
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014
Pages: 747 - 750A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes
Mokal P. H., Devikar R. N.