Simulation of Cyberattacks on Web Services in Controlled Environments: A Secure Approach to Vulnerability Assessment

Main Article Content

Paola Moncayo
Andrés Almeida
Darwin Valdiviezo

Abstract




The OWASP Juice Shop application was the target of this study to simulate cyber-attacks on web services in a controlled environment. SQL injection, open ports, malicious file uploads, directory traversal, cross-site request forgery (CSRF) and other common vulnerabilities were examined. To avoid ethical and legal consequences, the research was conducted in a secure environment. Findings included major flaws, such as open ports that allowed access to services and a SQL injection flaw that allowed unauthorized access to the database. XSS attacks demonstrated the execution of malicious code. However, the application was able to resist directory traversal attacks and malicious file uploads. To address the growing threat of cyberattacks, this study underscores the critical importance of incorporating strong cybersecurity measures into web services development beyond typical development considerations.




Downloads

Download data is not yet available.

Article Details

How to Cite
Simulation of Cyberattacks on Web Services in Controlled Environments: A Secure Approach to Vulnerability Assessment. (2025). Revista De Ciencias De Seguridad Y Defensa, 9(04), 15. https://doi.org/10.24133/
Section
Artículos

How to Cite

Simulation of Cyberattacks on Web Services in Controlled Environments: A Secure Approach to Vulnerability Assessment. (2025). Revista De Ciencias De Seguridad Y Defensa, 9(04), 15. https://doi.org/10.24133/

Similar Articles

You may also start an advanced similarity search for this article.