Team Dynamo

738 Words2 Pages

Methods (Acunetix and QualysGuard Freescan)
In addition to the Nmap analysis, we also conducted in-depth vulnerability assessments utilizing the commercially available Acunetix Web Vulnerability Scanner (Trial Edition) and the QualysGuard FreeScan web application tools to evaluate and detect potential weaknesses within the website: http://vlab02.pneumann.com/patients13/?bill_month=9. The Acunetix Web Vulnerability Scanner is an extremely robust security assessment tool commercially available through website downloads. The Acunetix tool’s key features include port scanner, HTTP sniffer, SQL injection tool, and a penetration tester capable of identifying a variety of potential website vulnerabilities including susceptibilities to buffer overflow and cross-site scripting (XXS) attacks (Acunetix, n.d.). Similar to the Acunetix web scanner, the QualysGuard Freecan tool is also a robust all-in one vulnerability assessment tool. The QualysGuard Freescan is cloud-based website vulnerability tool and port scanner capable of conducting over 5,000 vulnerability checks (Vacca, 2013). Both the Acunetix and the QualysGuard Freescan vulnerability assessment tools provide the user with a detailed report that identifies as well as prioritizes potential weaknesses and remedial actions within the target system or website.

Findings
The Acunetix web vulnerability scan revealed a total of 26 web alerts/potential vulnerabilities. Malicious attackers could possibly exploit these high-risk vulnerabilities to gain access to the sensitive information within the website’s database or damage/alter the website. The scan categorized three of the 26 potential vulnerabilities as severely high due to the website’s susceptibility to Structured Query Lang...

... middle of paper ...

...zed users to gain access to sensitive information. In order to ensure the security of private data and avoid unintended information leakage, utilizing hypertext transfer protocol over secure socket layer (HTTPS) provides encryption and a means of secure information. An authentication mechanism such as certificates would ensure that only authorized individuals with the proper credentials and proof of identify would be authorized to access sensitive data.

Works Cited

Goodrich, M. T. & Tomassia, R. (2011). Introduction to Computer Security. Boston,
Massachusetts: Pearson

Vacca, J.R. (2013). Computer and Information Security Handbook. Waltham, MA: Morgan
Kaufman

Wichers, D. & Manico, J. & Seil M. (2014, April 14) SQL Injection Prevention Cheat Sheet.
Retrieved from
https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet

Open Document