WSEAS Transactions on Computers
Print ISSN: 1109-2750, E-ISSN: 2224-2872
Volume 22, 2023
Penetration Testing for the Cloud-Based Web Application
Authors: ,
Abstract: This paper discusses methods, tools, approaches, and techniques used for the penetration testing on the cloud-based web application on Amazon AWS platform. The findings of a penetration test could be used to fix weaknesses and vulnerabilities, and significantly improve security. The testing is implemented by undertaking a malicious attack aiming to breach system networks and thereby confirm the presence of cloud infrastructure. The research focuses on cloud-based web applications' high-risk vulnerabilities such as unrestricted file upload, command injection, and cross-site scripting. The outcomes expose and approved some vulnerabilities, flaws, and mistakes in the utilised cloud based web application. It is concluded that some vulnerabilities haveto be considered before architecting the cloud system. Recommendations are proposing solutions to testing results.
Search Articles
Keywords: Penetration testing, pen test, ethical hacking, white hat hacking, black hat hacking, security testing, cyber security, cloud security, web application security, information security, and vulnerability assessment
Pages: 104-113
DOI: 10.37394/23205.2023.22.13