Penetration Testing and Simulation for Vulnerability Assessment in Application Security

Abstract

This project is a security framework that includes a backend server, a web application firewall (WAF), and a penetration testing tool to protect web applications and identify vulnerabilities. The backend server handles data requests and responses securely using Flask. The WAF acts as a protective layer, checking requests for threats like XSS and SQL Injection, blocking malicious traffic, and forwarding safe requests to the backend. The penetration testing tool scans ports, detects services, grabs banners, and checks for known vulnerabilities like BlueKeep and SMBv3 RCE. It also generates reports with security findings and recommendations. Together, these components secure the application by blocking threats, identifying risks, and providing actionable insights for improvement.

Country : India

1 T. Gnana Sudha2 N. Snehalatha3 A. Komala

  1. Department of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, India
  2. Department of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, India
  3. Department of CSE-Cybersecurity, Madanapalle Institute of Technology and Science, Madanapalle, AP, India

IRJIET, Volume 9, Special Issue of ICCIS-2025 May 2025 pp. 75-79

doi.org/10.47001/IRJIET/2025.ICCIS-202511

References

  1. Urshila Ravindran, Raghu Vamsi Potukuchi. "A Review on Web Application Vulnerability Assessment and Penetration Testing." Review of Computer Engineering Studies, Vol. 9, No. 1, March 2022, pp. 1-22. DOI: 10.18280/rces.090101​.
  2. Dipali N Railkar, Prof. Dr. Shubhalaxmi Joshi. "A Study on Vulnerability Scanning Tools for Network Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 8, Issue 6, January-February 2022, pp. 340-350​.
  3. Dr. T. Pandikumar, Tseday Eshetu. "Detecting Web Application Vulnerability using Dynamic Analysis with Penetration Testing." International Research Journal of Engineering and Technology (IRJET), Vol. 3, Issue 10, October 2016, pp. 430​.
  4. Trupti Bhosale, Shraddha More, Prof. S.N. Mhatre. "Testing Web Application using Vulnerability Scan." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 5, May 2019, pp. 265​.
  5. Seema Rani, Ritu Nagpal. "PENETRATION TESTING USING METASPLOIT FRAMEWORK: AN ETHICAL APPROACH." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 8, August 2019, pp. 538​.
  6. Korlam Sai Rajesh, Dr. M. Seshashayee. "Bug Hunting using Web Application Penetration Testing techniques." International Research Journal of Engineering and Technology (IRJET), Vol. 6, Issue 3, March 2019, pp. 5412​.
  7. Khushboo Amin, Dr. Priyanka Sharma. "Red Team Analysis of Information Security Measures and Response." International Research Journal of Engineering and Technology (IRJET), Vol. 7, Issue 4, April 2020, pp. 4279​.
  8. Binny George, Jenu Maria Scaria, Jobin B, Praseetha VM. "Web Application Security Scanner for Prevention and Protection against Vulnerabilities." International Research Journal of Engineering and Technology (IRJET), Vol. 7, Issue 5, May 2020, pp. 6267​.
  9. Pravin Kharat, Prof. Pramila M. Chawan. "Vulnerability Management System." International Research Journal of Engineering and Technology (IRJET), Volume 8, Issue 11, November 2021, pp. 25-26​.
  10. Pranav Nair, Meraj Farheen Ansari. "Vulnerabilities in AI Systems: The Integration of AI into Cybersecurity Tools and Systems." International Research Journal of Engineering and Technology (IRJET), Volume 11, Issue 7, July 2024, pp. 1159-1160​.