Skip to main content
Top

2016 | OriginalPaper | Chapter

CRiPT: Cryptography in Penetration Testing

Authors : Sachin Ahuja, Rahul Johari, Chetna Khokhar

Published in: Proceedings of the Second International Conference on Computer and Communication Technologies

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The speed and the rate at which the softwares are developed worldwide to meet the customer requirement(s) is increasing day by day. In order to meet the customer target-oriented deadline(s), the softwares are developed at fast pace, often missing vital security checks in the process. These checks become crucial when the software developed are deployed over the network in the client–server architecture and more significantly in the MVC (Model View Controller) architecture scenario. Then one may ask what is the solution? Possible answer is in secure system software engineering which incorporates principles of penetration testing. Penetration testing is one of the amicable and acceptable solution. It might not be a perfect one but it is effective. A penetration test is an attack on the system with the intent of finding security loopholes, potentially gaining access to it, its functionality and data. In this work, we have proposed a methodology for implementing penetration testing. We have taken several cryptographic algorithms such as AES, DES, MD5, and SHA to demonstrate our unique methodology which blends the cryptographic techniques with software engineering principles.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Dai, Z., Lv, L., Liang, X., Bo, Y.: Network penetration testing scheme description language. In: IEEE Computer Society, International Conference on Computational and Information Sciences (2011) Dai, Z., Lv, L., Liang, X., Bo, Y.: Network penetration testing scheme description language. In: IEEE Computer Society, International Conference on Computational and Information Sciences (2011)
5.
go back to reference Jain, S., Johari, R.: SECRA (Secure Erasure Coding based Routing Algorithm). In: International Conference on Research Trends in Computer Technologies (ICRTCT-2013) (Jan 2013) Jain, S., Johari, R.: SECRA (Secure Erasure Coding based Routing Algorithm). In: International Conference on Research Trends in Computer Technologies (ICRTCT-2013) (Jan 2013)
6.
go back to reference Jain, S., Johari, R.: AID (Attack Identification in DTN). In: 18 Annual cum 3rd International Conference of Gwalior Academy of Mathematical Sciences (GAMS) on Mathematical, Computational and Integrative Sciences, (Sept 2013) Jain, S., Johari, R.: AID (Attack Identification in DTN). In: 18 Annual cum 3rd International Conference of Gwalior Academy of Mathematical Sciences (GAMS) on Mathematical, Computational and Integrative Sciences, (Sept 2013)
7.
go back to reference Pan, W., Li, W.: A penetration testing method for e-commerce authentication system security. In: International Conference on Management of e-Commerce and e-Government, IEEE Computer Society (2009) Pan, W., Li, W.: A penetration testing method for e-commerce authentication system security. In: International Conference on Management of e-Commerce and e-Government, IEEE Computer Society (2009)
8.
go back to reference Jain, S., Kaur, A., Johari, R.: CPFSD (Code Penetration for Secure Development). In: 7th International Conference on Advanced Computing and Communication Technologies (ICACCT—2013) (Nov 2013) Jain, S., Kaur, A., Johari, R.: CPFSD (Code Penetration for Secure Development). In: 7th International Conference on Advanced Computing and Communication Technologies (ICACCT—2013) (Nov 2013)
9.
go back to reference Jain, S., Johari, R.: ECBEC (erasure coding block encryption using cryptography). In: Security and Privacy Symposium–2013, IIT Kanpur, (Feb 2013) Jain, S., Johari, R.: ECBEC (erasure coding block encryption using cryptography). In: Security and Privacy Symposium–2013, IIT Kanpur, (Feb 2013)
10.
go back to reference Weissman, C.: Penetration Testing. Trusted Computer System Evaluation Criteria, DoD 5200.28-STD (Dec 1985) (The Orange Book) Weissman, C.: Penetration Testing. Trusted Computer System Evaluation Criteria, DoD 5200.28-STD (Dec 1985) (The Orange Book)
11.
go back to reference Graw, G.Mc.: Software Security, Cigital, Inc Graw, G.Mc.: Software Security, Cigital, Inc
12.
go back to reference Geer, D., Harthorne, J.: Penetration testing :a duet, @Stake, dgeer@atstake.com Geer, D., Harthorne, J.: Penetration testing :a duet, @Stake, dgeer@atstake.com
13.
go back to reference Gupta, S., Johari, R.: A new framework for credit card transactions involving mutual authentication between cardholder and merchant. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 22–26, IEEE (2011) Gupta, S., Johari, R.: A new framework for credit card transactions involving mutual authentication between cardholder and merchant. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 22–26, IEEE (2011)
14.
go back to reference Johari, R., Gupta, N.: Secure query processing in delay tolerant network using java cryptography architecture. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657, IEEE (2011) Johari, R., Gupta, N.: Secure query processing in delay tolerant network using java cryptography architecture. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 653–657, IEEE (2011)
15.
go back to reference Johari, R., Sharma, P.: A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 453–458, IEEE (2012) Johari, R., Sharma, P.: A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection. In: International Conference on Communication Systems and Network Technologies (CSNT), pp. 453–458, IEEE (2012)
16.
go back to reference Sharma, P., Johari, R., Sarma, S.S.: Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. In: International Journal of System Assurance Engineering and Management, pp. 343–351, Springer (3 April 2012) Sharma, P., Johari, R., Sarma, S.S.: Integrated approach to prevent SQL injection attack and reflected cross site scripting attack. In: International Journal of System Assurance Engineering and Management, pp. 343–351, Springer (3 April 2012)
17.
go back to reference Jain, I., Johari, R., Ujjwal, R.L.: Web vulnerability exploitation using brute force attack and dictionary attack. In: proceedings of 9th National Conference on Smarter Approaches in Computing Technologies and Applications (SACTA-2014) (2014) Jain, I., Johari, R., Ujjwal, R.L.: Web vulnerability exploitation using brute force attack and dictionary attack. In: proceedings of 9th National Conference on Smarter Approaches in Computing Technologies and Applications (SACTA-2014) (2014)
18.
go back to reference Johari, R., Jain, I., Ujjwal, R.L.: Performance analysis of MD5, DES and AES encryption algorithms for credit card application. In: International Conference on Modeling and computing (ICMC—2014) (2014) Johari, R., Jain, I., Ujjwal, R.L.: Performance analysis of MD5, DES and AES encryption algorithms for credit card application. In: International Conference on Modeling and computing (ICMC—2014) (2014)
19.
go back to reference Ruby, L., Johari, R.: Designing a secure encryption technique for web based application. Int. J. Adv. Res. Sci. Eng. (IJARSE) [ISSN-2319-8354], 3(7), 159–163 (July 2014) Ruby, L., Johari, R.: Designing a secure encryption technique for web based application. Int. J. Adv. Res. Sci. Eng. (IJARSE) [ISSN-2319-8354], 3(7), 159–163 (July 2014)
20.
go back to reference Ruby, L., Johari, R.: SANE: Secure encryption technique for alphanumeric data over web based applications. Int. J. Eng. Res. Technol. (IJERT) [ISSN no: 2278–0181] 3(8), 8–11 (August 2014) Ruby, L., Johari, R.: SANE: Secure encryption technique for alphanumeric data over web based applications. Int. J. Eng. Res. Technol. (IJERT) [ISSN no: 2278–0181] 3(8), 8–11 (August 2014)
21.
go back to reference Jain, I., Johari, R., Ujjwal, R.L.: CAVEAT: Credit card vulnerability exhibition and authentication tool. In: Second International Symposium on Security in Computing and Communications (SSCC’14), pp. 391–399, Springer (2014) Jain, I., Johari, R., Ujjwal, R.L.: CAVEAT: Credit card vulnerability exhibition and authentication tool. In: Second International Symposium on Security in Computing and Communications (SSCC’14), pp. 391–399, Springer (2014)
22.
go back to reference Ahuja, S., Johari, R., Khokhar, C.: EAST: exploitation of attacks and system threats in network. In: Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing (ASIC) Series, vol. 339, pp. 601–611, Springer (2015) Ahuja, S., Johari, R., Khokhar, C.: EAST: exploitation of attacks and system threats in network. In: Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing (ASIC) Series, vol. 339, pp. 601–611, Springer (2015)
Metadata
Title
CRiPT: Cryptography in Penetration Testing
Authors
Sachin Ahuja
Rahul Johari
Chetna Khokhar
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2526-3_11