Mostrar el registro sencillo del ítem
Identificación y explotación de vulnerabilidades en aplicaciones web
dc.contributor.advisor | Mejia Fajardo, Angela Marcela | spa |
dc.contributor.author | Castañeda Suárez, Andrés Fernando | |
dc.coverage.spatial | Calle 100 | spa |
dc.date.accessioned | 2017-09-05T16:33:06Z | |
dc.date.accessioned | 2019-12-26T22:06:17Z | |
dc.date.available | 2017-09-05T16:33:06Z | |
dc.date.available | 2019-12-26T22:06:17Z | |
dc.date.issued | 2017-07-06 | |
dc.identifier.uri | http://hdl.handle.net/10654/16513 | |
dc.description.abstract | Con el desarrollo de la investigación se pretende describir una metodología simple que le permita a un evaluador o administrador de red, monitorear y analizar de un forma sencilla los sitios web que componen su red a través de procesos de recolección de información relacionada con el sitio, identificación de vulnerabilidades a través del uso de herramientas automatizadas, con el fin de explotar una vulnerabilidad en términos de acceso, escalabilidad de privilegios y daños. | spa |
dc.description.sponsorship | UMNG | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.title | Identificación y explotación de vulnerabilidades en aplicaciones web | spa |
dc.type | info:eu-repo/semantics/bachelorThesis | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.subject.lemb | REDES DE COMPUTADORES | spa |
dc.subject.lemb | ADMINISTRACION DE REDES DE COMPUTADORES | spa |
dc.subject.lemb | REDES DE COMPUTADORES - MEDIDAS DE SEGURIDAD | spa |
dc.publisher.department | Facultad de Ingeniería | spa |
dc.type.local | Trabajo de grado | spa |
dc.description.abstractenglish | With the development of the research is intended to describe a simple methodology that allows an evaluator or network administrator to monitor and analyze in a simple way the web sites that make up their network through processes for collecting information related to the site, Identification of vulnerabilities through the use of automated tools, in order to exploit a vulnerability in terms of access, privilege scalability and damages. | eng |
dc.title.translated | Identification and exploitation of vulnerabilities on web applications | spa |
dc.subject.keywords | security | spa |
dc.subject.keywords | owasp | spa |
dc.subject.keywords | exploitation | spa |
dc.subject.keywords | vulnerability | spa |
dc.subject.keywords | web | spa |
dc.publisher.program | Ingeniería en Telecomunicaciones | spa |
dc.creator.degreename | Ingeniero en Telecomunicaciones | spa |
dc.description.degreelevel | Pregrado | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.relation.references | Y. Wang and J. Yang, "Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool," 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), Taipei, Taiwan, 2017, pp. 110-113. Disponible en: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7929663&isnumber=7929 495 | spa |
dc.relation.references | S. A. Kaabi, N. A. Kindi, S. A. Fazari and Z. Trabelsi, "Virtualization based ethical educational platform for hands-on lab activities on DoS attacks," 2016 IEEE Global Engineering Education Conference (EDUCON), Abu Dhabi, 2016, pp. 273-280. Disponible en: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7474565&isnumber=7 474513 | spa |
dc.relation.references | OWASP, “Guía De Prueba De Owasp”, 2016, pp 5. Disponible en: https://www.owasp.org/images/1/19/OTGv4.pdf | spa |
dc.relation.references | Owasp.org, (2015). OWASP Testing Project - OWASP. Retrieved November 2014, Disponible en: https://www.owasp.org/index.php?title=OWASP_Testing_Project&setlang=es#tab=Pro ject_About | spa |
dc.relation.references | PortSwigger Ltd, “Getting Started With Burp Suite”, 2017. Disponible en: https://portswigger.net/burp/help/suite_gettingstarted.html | spa |
dc.relation.references | OWASP, “Guía de Pruebas De Owasp V4”, 2016, pp 6. Disponible en: https://www.owasp.org/images/1/19/OTGv4.pdf | spa |
dc.relation.references | Acunetix Ltd. “Product Manual”. 2017. Disponible en: https://www.acunetix.com/resources/wvsmanual.pdf | spa |
dc.relation.references | OWASP. “SQL Injection”. 2017. Disponible en: https://www.owasp.org/index.php/SQL_Injection | spa |
dc.relation.references | OWASP. “Top 10 2007-Secuencia de Comandos en Sitios Cruzados (XSS)”. 2017. Disponible en: https://www.owasp.org/index.php/Top_10_2007- Secuencia_de_Comandos_en_Sitios_Cruzados_(XSS) | spa |
dc.relation.references | Balderrama E. “OWASP Zed Attack ProxyGuide”, 2016. Disponible en: https://www.gitbook.com/book/snifer/owasp-zed-attack-proxy-guide/details | spa |
dc.relation.references | OWASP, “Guía de Pruebas De Owasp V4”, 2016, pp 9-10. Disponible en: https://www.owasp.org/images/1/19/OTGv4.pdf | spa |
dc.relation.references | wasp.org,. OWASP Zed Attack Proxy Project - OWASP. Retrieved November 2014, Dsiponible en: https://www.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&setlang= es | spa |
dc.relation.references | OWASP, “Guía de Pruebas De Owasp V4”, 2016, pp 28. Disponible en: https://www.owasp.org/images/1/19/OTGv4.pdf | spa |
dc.relation.references | Nunez A. “que es un exploit?”. 2016. Disponible en: http://www.seguridadjabali.com/2012/09/que-es-exploit.html | spa |
dc.subject.proposal | seguridad | spa |
dc.subject.proposal | owasp | spa |
dc.subject.proposal | explotacion | spa |
dc.subject.proposal | vulnerabilidad | spa |
dc.subject.proposal | web | spa |
dc.publisher.grantor | Universidad Militar Nueva Granada | spa |