dc.contributor | Correa Botero, Daniel | |
dc.contributor | Vallejo Correa, Paola Andrea | |
dc.creator | Ramos Mena, Ángel Eduardo | |
dc.date.accessioned | 2023-05-08T21:20:07Z | |
dc.date.accessioned | 2023-08-28T14:09:01Z | |
dc.date.available | 2023-05-08T21:20:07Z | |
dc.date.available | 2023-08-28T14:09:01Z | |
dc.date.created | 2023-05-08T21:20:07Z | |
dc.date.issued | 2022 | |
dc.identifier | http://hdl.handle.net/10784/32437 | |
dc.identifier | 005.8 R175 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/8441579 | |
dc.description.abstract | The development of technological applications has constantly been evolving to
provide a better experience for users, as it can ensure their security to avoid specific
threats that could interfere with their actual operation. Despite the efforts, internal
and external security threats are present, which is why it is necessary to take all
possible precautions to respond to them. Currently, web application frameworks
(Web Application Frameworks - WAF) facilitate development and enhance security in web applications. In this work, we focus on how the WAFs Laravel, Express, Spring, and Django, provide mechanisms to implement security in web applications.
An application was developed with the MVC (Model - View - Controller) architecture
pattern in each of the selected WAFs. Cross-Site Scripting, SQL Injection, and
Cross-Site Request Forgery hacking techniques were chosen to alter the
applications in an unauthorized manner. These techniques were used to observe
how applications can be breached. We also analyzed how prepared WAFs are to
deal with these techniques, what rules they incorporate to ensure adequate
protection, and how risk can be minimized to make development in a specific WAF
more secure. | |
dc.language | spa | |
dc.publisher | Universidad EAFIT | |
dc.publisher | Maestría en Ingeniería | |
dc.publisher | Escuela de Ciencias Aplicadas e Ingeniería | |
dc.publisher | Medellín | |
dc.rights | http://creativecommons.org/licenses/by/4.0/deed.es | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | Acceso abierto | |
dc.rights | Todos los derechos reservados | |
dc.subject | XSS | |
dc.subject | SQL Injection | |
dc.subject | CSRF | |
dc.subject | Seguridad | |
dc.subject | Técnica de hacking | |
dc.subject | Modelo-Vista-Controlador (MVC) | |
dc.subject | Framework de aplicación web (WAF) | |
dc.subject | Spring | |
dc.subject | Laravel | |
dc.subject | Django | |
dc.subject | Express | |
dc.title | Análisis de seguridad de XSS, SQL Injection y CSRF en Laravel, Django, Express y Spring | |
dc.type | masterThesis | |
dc.type | info:eu-repo/semantics/masterThesis | |