Penetration Testing and Simulation for Vulnerability Assessment in Application Security

T. Gnana SudhaDepartment of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, IndiaN. SnehalathaDepartment of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, IndiaA. KomalaDepartment of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, India

Vol 9 No 2025 (2025): Volume 9, Special Issue of ICCIS-2025 May 2025 | Pages: 75-79

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 11-06-2025

doi Logo doi.org/10.47001/IRJIET/2025.ICCIS-202511

Abstract

This project is a security framework that includes a backend server, a web application firewall (WAF), and a penetration testing tool to protect web applications and identify vulnerabilities. The backend server handles data requests and responses securely using Flask. The WAF acts as a protective layer, checking requests for threats like XSS and SQL Injection, blocking malicious traffic, and forwarding safe requests to the backend. The penetration testing tool scans ports, detects services, grabs banners, and checks for known vulnerabilities like BlueKeep and SMBv3 RCE. It also generates reports with security findings and recommendations. Together, these components secure the application by blocking threats, identifying risks, and providing actionable insights for improvement.

Keywords

Penetration Testing, Vulnerability Assessment, Application Security, SQL Injection, Cross-Site Scripting, Network Reconnaissance, Python, Cybersecurity, IP and Port Scanning, Security Testing, Automated Penetration Testing


Citation of this Article

T. Gnana Sudha, N. Snehalatha, & A. Komala. (2025). Penetration Testing and Simulation for Vulnerability Assessment in Application Security. In proceeding of Second International Conference on Computing and Intelligent Systems (ICCIS-2025), published in IRJIET, Volume 9, Special Issue ICCIS-2025, pp 75-79. Article DOI https://doi.org/10.47001/IRJIET/2025.ICCIS-202511

References
  1. Urshila Ravindran, Raghu Vamsi Potukuchi. "A Review on Web Application Vulnerability Assessment and Penetration Testing." Review of Computer Engineering Studies, Vol. 9, No. 1, March 2022, pp. 1-22. DOI: 10.18280/rces.090101​.
  2. Dipali N Railkar, Prof. Dr. Shubhalaxmi Joshi. "A Study on Vulnerability Scanning Tools for Network Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 8, Issue 6, January-February 2022, pp. 340-350​.
  3. Dr. T. Pandikumar, Tseday Eshetu. "Detecting Web Application Vulnerability using Dynamic Analysis with Penetration Testing." International Research Journal of Engineering and Technology (IRJET), Vol. 3, Issue 10, October 2016, pp. 430​.
  4. Trupti Bhosale, Shraddha More, Prof. S.N. Mhatre. "Testing Web Application using Vulnerability Scan." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 5, May 2019, pp. 265​.
  5. Seema Rani, Ritu Nagpal. "PENETRATION TESTING USING METASPLOIT FRAMEWORK: AN ETHICAL APPROACH." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 8, August 2019, pp. 538​.
  6. Korlam Sai Rajesh, Dr. M. Seshashayee. "Bug Hunting using Web Application Penetration Testing techniques." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 3, March 2019, pp. 5412​.
  7. Khushboo Amin, Dr. Priyanka Sharma. "Red Team Analysis of Information Security Measures and Response." International Research Journal of Engineering and Technology (IRJET), Vol. 7, Issue 4, April 2020, pp. 4279​.
  8. Binny George, Jenu Maria Scaria, Jobin B, Praseetha VM. "Web Application Security Scanner for Prevention and Protection against Vulnerabilities." International Research Journal of Engineering and Technology (IRJET), Vol. 7, Issue 5, May 2020, pp. 6267​.
  9. Pravin Kharat, Prof. Pramila M. Chawan. "Vulnerability Management System." International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 11, November 2021, pp. 25-26​.
  10. Pranav Nair, Meraj Farheen Ansari. "Vulnerabilities in AI Systems: The Integration of AI into Cybersecurity Tools and Systems." International Research Journal of Engineering and Technology (IRJET), Volume 11, Issue 7, July 2024, pp. 1159-1160​.