Developing Firefox add-on for DOM vulnerability Assessment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications which allows the attackers to inject malicious script into web pages/servers. XSS is the main cause of DOM attack. This add-on is a penetration testing tool to detect DOM vulnerabilities in Web Applications. This tool detects the DOM vulnerabilities based on xss vulnerabilities in the web page. It provides a penetration tester the ability to test all kinds of xss vulnerabilities. This add-on will be useful for web application developers in detecting DOM vulnerabilities early in the development process will help protect a web application from unnecessary flaws.

Keywords: Vulnerability Testing, Cross-site scripting, Web Applications, Security, Code Insertion,

Edition: Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Share this Article

How to Cite this Article?

Saranraj Ilangovan, Geogen George, "Developing Firefox add-on for DOM vulnerability Assessment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153449, Volume 4 Issue 4, April 2015, 1635 - 1639

140 PDF Views | 98 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Vulnerability Testing'

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Views: 131 , Downloads: 119 | CTR: 91 % | Weekly Popularity: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 636 - 640

Exploit Development Research on x86 Windows Application: Buffer Overflow

Geogen George, Sivasundaram R

Share this Article

Similar Articles with Keyword 'Cross-site scripting'

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Views: 135 , Downloads: 102 | CTR: 76 % | Weekly Popularity: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1274 - 1277

Automation of Mutated Cross Site Scripting

Anchal Tiwari, J. Jeysree

Share this Article

Similar Articles with Keyword 'Web Applications'

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Views: 137 , Downloads: 107 | CTR: 78 % | Weekly Popularity: ⮙3

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 2032 - 2036

A Survey on CAPTCHA as Graphical Password

Priti P. Doke, S.A Nagtilak

Share this Article

Views: 131 , Downloads: 112 | CTR: 85 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1160 - 1163

Dynamic Application Development for Web Application Process

Saranya Seera, Y. Sangeetha

Share this Article

Views: 150 , Downloads: 116 | CTR: 77 % | Weekly Popularity: ⮙4

Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1904 - 1907

Web Testing: A Review on Tool, Challenges and Techniques

Jyoti

Share this Article

Views: 168 , Downloads: 140 | CTR: 83 % | Weekly Popularity: ⮙6

Research Paper, Information Technology, Indonesia, Volume 8 Issue 7, July 2019

Pages: 1228 - 1234

Accountability of Course Graduation Records using Permissioned Blockchain in Hyperledger Fabric

Linda Handayani, Avinanta Tarigan

Share this Article

Similar Articles with Keyword 'Security'

Views: 117 , Downloads: 82 | CTR: 70 % | Weekly Popularity: ⮙6

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙3

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Views: 131 , Downloads: 100 | CTR: 76 % | Weekly Popularity: ⮙5

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Views: 143 , Downloads: 101 | CTR: 71 % | Weekly Popularity: ⮙6

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Views: 150 , Downloads: 101 | CTR: 67 % | Weekly Popularity: ⮙5

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article
Top