Several issues were discovered throughout the project's
development; some were resolved, while others were not, but
a lot was learnt as a result of them.
4. Future Recommecdation
Penetration Standards, Frameworks and Methodologies
can be very helpful to secure and fix their cybersecurity issues.
There are most popular standards, frameworks, and
methodologies such as Open Web Application Security
Project (OWASP) Top 10, Open-Source Security Testing
Methodology Manual (OSSTMM), Information Systems
Security Assessment Framework (ISSAF), National Institute
of Standards and Technology (NIST) and Penetration Testing
Execution Standard (PTES).
References
[1] Acunetix (2015) How File Upload Forms are Used by Online
Attackers, Acunetix. Available at:
https://www.acunetix.com/websitesecurity/upload-forms-threat/
(Accessed: 28 December 2022).
[2] Allsopp, W. (2010) Unauthorised access: physical penetration testing
for IT security teams. John Wiley & Sons.
[3] Ami, P. and Hasan, A. (2012) ‘Seven Phrase Penetration Testing
Model’, International Journal of Computer Applications, 59(5), pp.
16–20. Available at: https://doi.org/10.5120/9543-3991.
[4] Arkin, B., Stender, S. and McGraw, G. (2005) ‘Software penetration
testing’, IEEE Security Privacy, 3(1), pp. 84–87. Available at:
https://doi.org/10.1109/MSP.2005.23.
[5] Austin, A., Holmgreen, C. and Williams, L. (2013) ‘A comparison of
the efficiency and effectiveness of vulnerability discovery techniques’,
Information and Software Technology, 55(7), pp. 1279–1288.
Available at: https://doi.org/10.1016/j.infsof.2012.11.007.
[6] AWS (2022) Web Hosting - Amazon Web Services (AWS), Amazon
Web Services, Inc. Available at: https://aws.amazon.com/websites/
(Accessed: 3 January 2023).
[7] BBC News (2017) ‘Ukraine power cut “was cyber-attack”’, 11 January.
Available at: https://www.bbc.com/news/technology-38573074
(Accessed: 15 May 2022).
[8] Beck, K. (1999) ‘Embracing change with extreme programming’,
Computer, 32(10), pp. 70–77. Available at:
https://doi.org/10.1109/2.796139.
[9] Bellatriu, O.C. (2014) ‘Penetration Testing Automation System’, p.
105.
[10] Berinato, S. (2001) The Secret to Software Success, CIO. Available at:
https://www.cio.com/article/266624/enterprise-software-the-secret-to-
software-success.html (Accessed: 28 December 2022).
[11] Boehm, B. (2002) ‘Get ready for agile methods, with care’, Computer,
35(1), pp. 64–69. Available at: https://doi.org/10.1109/2.976920.
[12] Budiarto, R., Ramadass, S., Samsudin, A. and Noor, S. (2004)
‘Development of penetration testing model for increasing network
security’, in Proceedings. 2004 International Conference on
Information and Communication Technologies: From Theory to
Applications, 2004. Proceedings. 2004 International Conference on
Information and Communication Technologies: From Theory to
Applications, 2004., Damascus, Syria: IEEE, pp. 563–564. Available
at: https://doi.org/10.1109/ICTTA.2004.1307886.
[13] Cheng, K., Guo, R. and Gao, M. (2010) ‘An Optimizing Chinese String
Matching Algorithm Based on the URL Encoding’, in 2010 WASE
International Conference on Information Engineering. 2010 WASE
International Conference on Information Engineering (ICIE 2010),
Beidaihe, Hebei: IEEE, pp. 23–25. Available at:
https://doi.org/10.1109/ICIE.2010.13.
[14] Choi, H. and Kim, Y. (2018) ‘Large-Scale Analysis of Remote Code
Injection Attacks in Android Apps’, Security and Communication
Networks, 2018, pp. 1–17. Available at:
https://doi.org/10.1155/2018/2489214.
[15] CNET News staff (1995) ‘Netscape and Sun Unveil JavaScript’,
CNET, 30 November. Available at:
https://www.cnet.com/tech/services-and-software/netscape-and-sun-
unveil-javascript/ (Accessed: 5 January 2023).
[16] Cockburn, A. (2002) Agile Software Development. USA: Addison-
Wesley Longman Publishing Co., Inc.
[17] Dimkov, T., Pieters, W. and Hartel, P. (2010) ‘Two methodologies for
physical penetration testing using social engineering’, in Proceedings
of the 26th Annual Computer Security Applications Conference on -
ACSAC ’10. the 26th Annual Computer Security Applications
Conference, Austin, Texas: ACM Press, p. 399. Available at:
https://doi.org/10.1145/1920261.1920319.
[18] Dybå, T. and Dingsøyr, T. (2008) ‘Empirical studies of agile software
development: A systematic review’, Information and Software
Technology, 50(9–10), pp. 833–859. Available at:
https://doi.org/10.1016/j.infsof.2008.01.006.
[19] Engebretson, P. and Broad, J. (2011) The basics of hacking and
penetration testing: ethical hacking and penetration testing made easy.
Waltham, MA: Syngress (Syngress the basics).
[20] Erickson, J., Lyytinen, K. and Siau, K. (2005) ‘Agile Modeling, Agile
Software Develpment, and Extreme Programming’:
[21] Florea, R., Link to external site, this link will open in a new window
and Stray, V. (2019) ‘The skills that employers look for in software
testers’, Software Quality Journal, 27(4), pp. 1449–1479. Available at:
https://doi.org/10.1007/s11219-019-09462-5.
[22] Fonseca, J. and Vieira, M. (2008) ‘Mapping software faults with web
security vulnerabilities’, in 2008 IEEE International Conference on
Dependable Systems and Networks With FTCS and DCC (DSN). 2008
IEEE International Conference on Dependable Systems and Networks
With FTCS and DCC (DSN), Anchorage, AK: IEEE, pp. 257–266.
Available at: https://doi.org/10.1109/DSN.2008.4630094.
[23] Fonseca, J., Vieira, M., Madeira, H. and Henrique, M. (2008) ‘Training
Security Assurance Teams Using Vulnerability Injection’, in 2008 14th
IEEE Pacific Rim International Symposium on Dependable
Computing. 2008 14th IEEE Pacific Rim International Symposium on
Dependable Computing, pp. 297–304. Available at:
https://doi.org/10.1109/PRDC.2008.43.
[24] Geer, D. and Harthorne, J. (2002) ‘Penetration testing: a duet’, in 18th
Annual Computer Security Applications Conference, 2002.
Proceedings. 18th Annual Computer Security Applications
Conference, 2002. Proceedings., pp. 185–195. Available at:
https://doi.org/10.1109/CSAC.2002.1176290.
[25] Hare, C. (2000) ‘Improving Network- Level Security Through Real-
time Monitoring and Intrusion Detection’, p. 27.
[26] Hasan, A. and Meva, D. (2018) Web Application Safety by Penetration
Testing. SSRN Scholarly Paper 3315587. Rochester, NY: Social
Science Research Network. Available at:
https://papers.ssrn.com/abstract=3315587 (Accessed: 14 May 2022).
[27] Hirsch, M. (2002) ‘Making RUP Agile’, in OOPSLA 2002
Practitioners Reports. New York, NY, USA: Association for
Computing Machinery (OOPSLA ’02), pp. 1-ff. Available at:
https://doi.org/10.1145/604251.604254.
[28] Holik, F., Horalek, J., Marik, O., Neradova, S. and Zitta, S. (2014)
‘Effective penetration testing with Metasploit framework and
methodologies’, in 2014 IEEE 15th International Symposium on
Computational Intelligence and Informatics (CINTI). 2014 IEEE 15th
International Symposium on Computational Intelligence and
Informatics (CINTI), pp. 237–242. Available at:
https://doi.org/10.1109/CINTI.2014.7028682.
[29] Huang, J., Li, Y., Zhang, J. and Dai, R. (2019) ‘UChecker:
Automatically Detecting PHP-Based Unrestricted File Upload
Vulnerabilities’, in 2019 49th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks (DSN). 2019 49th
Annual IEEE/IFIP International Conference on Dependable Systems
and Networks (DSN), Portland, OR, USA: IEEE, pp. 581–592.
Available at: https://doi.org/10.1109/DSN.2019.00064.
[30] Jayaram, K. and Mathur, A.P. (2005) ‘Software engineering for secure
software-state of the art: A survey’, Purdue University [Preprint].
[31] Jensen, S.H., Møller, A. and Thiemann, P. (2009) ‘Type Analysis for
JavaScript’, in J. Palsberg and Z. Su (eds) Static Analysis. Berlin,
Heidelberg: Springer Berlin Heidelberg (Lecture Notes in Computer
Science), pp. 238–255. Available at: https://doi.org/10.1007/978-3-
642-03237-0_17.
[32] Jones, S. (2019) ‘Venezuela blackout: what caused it and what happens
next?’, The Guardian, 13 March. Available at:
https://www.theguardian.com/world/2019/mar/13/venezuela-
blackout-what-caused-it-and-what-happens-next (Accessed: 15 May
2022).
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2023.22.13
Rafid Al-Khannak, Sajjan Singh Nehal