Comparative analysis of the effectiveness of OWASP ZAP, Burp Suite, Nikto and Skipfish in testing the security of web applications
Article Sidebar
Open full text
Issue Vol. 24 (2022)
-
Learning speed or prediction accuracy? Comparative analysis of program-ming frameworks for artificial intelligence
Konrad Zdeb, Piotr Żukiewicz, Edyta Łukasik172-175
-
Comparative analysis of the effectiveness of OWASP ZAP, Burp Suite, Nikto and Skipfish in testing the security of web applications
Aleksandra Kondraciuk, Aleksandra Bartos, Beata Pańczyk176-180
-
Comparative analysis of the functionality and quality of the interface of chosen applications for ordering food
Maciej Gieroba, Marek Miłosz181-188
-
Comparative analysis of the quality of recorded sound in the function of different recording formats
Andrzej Król, Tomasz Szymczyk189-194
-
Comparison of the most popular operating systems in terms of functionalities
Jacek Lato, Marek Mucha, Tomasz Szymczyk195-202
-
Analysis of the medical personnel's views on keeping records in an electronic form
Maciej Mikrut203-209
-
Analysis of the functionality of voice and video communication systems
Aleksandra Piątkowska210-217
-
Comparative analysis of the Cycles and Eevee graphics engines on the example of rendering 3D models of archaeological artifacts
Sebastian Dudek, Krzysztof Dziedzic218-223
-
Comparative analysis of React, Next and Gatsby programming frameworks for creating SPA applications
Adam Świątkowski, Karol Ścibior224-227
-
Performance comparison between selected chess engines
Maciej Sojka228-235
-
Comparison of the offer of selected cloud service providers from the point of view of implementing IT projects based on open code
Porównanie ofert wybranych dostawców usług chmurowych z punktu wi-dzenia realizacji projektów informatycznych opartych o otwarty kodJan Baran, Sławomir Przyłucki236-241 -
Comparative analysis of reactive and imperative approach in Java web application development
Sebastian Iwanowski, Grzegorz Kozieł242-249
-
Performance analysis of relational databases MySQL, PostgreSQL and Oracle using Doctrine libraries
Marcin Choina, Maria Skublewska-Paszkowska250-257
-
A comparative analysis of tools dedicated to project management
Piotr Pawłowski; Małgorzata Plechawska-Wójcik258-264
-
Performance analysis of Laravel and Yii2 frameworks based on the MVC architectural pattern and PHP language
Konrad Sławomir Węgrzecki, Mariusz Dzieńkowski265-272
-
Comparative analysis of Java and Dart programming languages in terms of suitability for creating mobile applications
Łukasz Kozłowski, Grzegorz Kozieł273-279
Main Article Content
DOI
Authors
aleksandra.kondraciuk@pollub.edu.pl
aleksandra.bartos@pollub.edu.pl
Abstract
Application security is one of the key aspects necessary for its proper functioning. Ensuring security consists primarily in conducting regular penetration tests and checking the vulnerability of the application to various types of attacks. The recommended solution is to use tools dedicated to detecting security holes in applications. Choosing the right tool from among those available on the market can be difficult. This article presents a comparative analysis of the effectiveness of popular application security testing tools in terms of the number of detected vulnerabilities. The analysis was based on the obtained results of scanning two Internet applications containing a number of security vulnerabilities, used to learn ethical hacking.
Keywords:
References
D.D. Bertoglio, A.F. Zorzo, Overview and open issues on penetration test, Journal of the Brazilian Computer Society volume 23, Article number 2 (2017) 1-2. DOI: https://doi.org/10.1186/s13173-017-0051-1
Spis narzędzi służących do skanowania bezpieczeństwa polecanych przez OWASP, https://owasp.org/www-community/Vulnerability_Scanning_Tools, [02.2022].
R. Devi, M. Kumar, Testing for Security Weakness of Web Applications using Ethical Hacking, 2020 4th International Conference on Trends in Electronics and Informatics (2020) 354, 358-360. DOI: https://doi.org/10.1109/ICOEI48184.2020.9143018
D. Sagar, S. Kukreja, J. Brahma, S. Tyagi, P. Jain, Studying Open Source Vulnerability Scanners For Vulnerabilities In Web Applications, Accendere KMS Services Pvt. Ltd, New Delhi, INDIA (2018) 43-49.
B. Mburano, W. Si, Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark, 2018 26th International Conference on Systems Engineering (2018) 1-2. DOI: https://doi.org/10.1109/ICSENG.2018.8638176
Dokumentacja i kod źródłowy aplikacji bWAPP, https://sourceforge.net/projects/bwapp/files/bWAPP/, [03.2022].
Dokumentacja i kod źródłowy aplikacji Mutillidae, https://github.com/webpwnized/mutillidae, [03.2022].
M. El, E. McMahon, S. Samtani, M. Patton, H. Chen, Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments, IEEE International Conference on Intelligence and Security Informatics (ISI) (2017) 83-85. DOI: https://doi.org/10.1109/ISI.2017.8004879
S. Tyagi, K. Kumar, Evaluation of Static Web Vulnerability Analysis Tools, 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (2018) 1-3. DOI: https://doi.org/10.1109/PDGC.2018.8745996
Article Details
Abstract views: 2291
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
