{"title":"Web server scanner: scanning on IIS CGI and HTTP","authors":"S. R. Selamat","doi":"10.1109/APCC.2003.1274232","DOIUrl":null,"url":null,"abstract":"This paper explains about the design and implementation of Web server scanner. The scanner detected the security weaknesses on IIS, CGI and HTTP. A report is produced for audit log purposes to help decrease the security weaknesses. In Internet security, no hacking tool is more celebrated than the scanner. The scanner is a program that automatically detects security weaknesses in a remote or local host. It might reveal certain inherent weakness within the target host. The primary attributes of the scanner includes the capability to find a machine or network, the capability to find out what services are being run on the host, and the capability to test those services for known holes.","PeriodicalId":277507,"journal":{"name":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APCC.2003.1274232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper explains about the design and implementation of Web server scanner. The scanner detected the security weaknesses on IIS, CGI and HTTP. A report is produced for audit log purposes to help decrease the security weaknesses. In Internet security, no hacking tool is more celebrated than the scanner. The scanner is a program that automatically detects security weaknesses in a remote or local host. It might reveal certain inherent weakness within the target host. The primary attributes of the scanner includes the capability to find a machine or network, the capability to find out what services are being run on the host, and the capability to test those services for known holes.