2019 2nd International Conference of Computer and Informatics Engineering (IC2IE) 2019
DOI: 10.1109/ic2ie47452.2019.8940872
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 4 publications
0
6
0
1
Order By: Relevance
“…The security evaluation was conducted of a web application that employs penetration testing strategies to showcase manin-the-middle attacks [10]. They used a few penetration testing strategies like SQL Injection, cross-site scripting (XSS), and brute force attacks.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The security evaluation was conducted of a web application that employs penetration testing strategies to showcase manin-the-middle attacks [10]. They used a few penetration testing strategies like SQL Injection, cross-site scripting (XSS), and brute force attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Penetration testing for web applications has been an active area of research in recent years, with researchers proposing new methodologies, tools, and case studies. Some studies have focused on specific types of web app vulnerabilities like SQL injection [7] and XSS [8], while others have taken a more comprehensive approach covering various vulnerabilities [9][10][11][12]. The use of automated scanning tools like Nmap, Nikto, and ZAP, along with manual verification, has been commonly employed.…”
Section: Introductionmentioning
confidence: 99%
“…Several studies have been carried out on Android permission requests [26], Android user privacy [27], attacks on Android and other mobile platforms [28,29], including malware attacks [30], synchronous channels attack [31], side-channel attacks [32], runtime repackaging attacks [33], and Man-in-the-Middle attacks [34] accuracy. This section of the paper provides a brief examination of some of the related works carried out.…”
Section: Permission-based Detection and Feature Extractionmentioning
confidence: 99%
“…The range of attacks on digital signature are: 1. Man-in-the-middle [12] [13] For an attack to succeed in getting around authentication, interface access is necessary. It does this by intercepting and fabricating messages in a way that compels the device to communicate with the attacker using a key they know (Clark et al 1996).…”
Section: Introductionmentioning
confidence: 99%