

The framework is run against a target web server using a well-known port scanning tool, Nmap. It obtains prior knowledge of the vulnerable extensions of a specific CMS from its contributors.

This framework targets the web applications developed with content management systems (CMSs). In this paper, an effective framework for vulnerability detection of web application is proposed. For this reason, vulnerability detection needs to be carried out in an effective way and should be mitigated as soon as possible. Preventive measures must be taken to deal with these attacks on the web servers. Web server is one of the most important components of this infrastructure. Any ideas of how to accomplish this would be appreciated.ĭumpcap -i1 -b filesize:100000 files:200 -f not src net 10. the era of technology, attack on computer infrastructure is considered as the most severe threat. To the script, but in both cases it complained about a syntax issue. It is important to collect all of the network traffic so I was hoping just to filter out transfers between these two machines rather than specifying all of the connections I need to capture. The only problem is that the PCAP then includes this transfer in the files and as they are already compressed causes the files to balloon in size, going from sub 10 MB to 80 MB+. We have access to another machine on the network not in the data center and would like to collect the files over the network.

The work flow at the moment involves collecting the files directly from the data center and uploading to a work machine for analysis. After X period of time the files are compressed using 7 zip to make the files as small as possible. Currently I have some traffic being forwarded to a machine in a data center, this machine has a PCAP script running to grab all of this traffic.
