From Figure 4, it is also possible to observe that 
the  ZAP  scanner  was  the  only  one  that  detected 
security flaws related to the use of components with 
known  vulnerabilities  and  logging  and  insufficient 
monitoring. Moreover, this was the only scanner with 
built-in capabilities to detect such security problems 
on web applications. Similarly, the PT scanner was 
the  only  one  that  detected  security  flaws  directly 
linked  to  the  failed  access  control  authentication 
(Broken Access Control). All web scanners converge 
on identifying security flaws related to Injection, Poor 
Security  Configuration,  and  Cross-Site  Scripting. 
During the study, it was also possible to find that only 
two  (2)  of  the  ten  (10)  universities  maintain  their 
degree  of  security  risk  from  when  the  study  was 
conducted  while  the  other  universities  see  their 
security risk level degrading. 
5  CONCLUSIONS 
The number of security flaws identified in this study 
and  the  degree  of  vulnerability of  web  applications 
ranging from medium to high risk demonstrates that 
the  web  applications  of  Angolan  universities,  in 
general,  are  not  secure.  It  was  also  possible  to 
conclude  that  70%  of  applications  communicate 
through  unsafe  channels  due  to  the  absence  of 
security certificates (and therefore without SSL/TLS) 
and  use  JavaScript  libraries  with  known 
vulnerabilities,  thus  being  exposed  to  cross-site 
scripting attacks. The present study also found that all 
web applications provide too much information about 
their ecosystems (operating systems, server versions 
and applications), which can enhance the increase in 
the degree of vulnerabilities if the systems are not up-
to-date  and  bug-free.  Moreover,  this  information 
leakage  can  provide  more  clues  for  attackers  to 
compromise  those  applications  and  the  information 
they  hold.  Another  relevant  aspect  of  this  study  is 
discovering  the  relationship  between  the  security 
flaws  found  with  the  various  content  management 
systems (CMS) that universities use. That is, the lack 
of updating of these applications, their components 
and JavaScript libraries increase the risk of security 
breaches  and  makes  all  dependent  applications 
vulnerable  since  this  type  of  applications  are 
interconnected  with the  others.  In  some cases,  they 
serve  as  a  web  portal  to  access  other  resources  or 
applications. The usage of different types of scanners, 
with varying settings of parameterisation in terms of 
sensitivity,  depth  and  aggressiveness,  allowed  to 
identify of  security  flaws  that another web  scanner 
could have ignored and consequently to obtain a false 
sense of security due to the absence of certain types 
of vulnerabilities that exist in the application but that 
the  scanner  used  was  not  able  to  identify.  For  this 
reason,  it  is  recommended  to  use  several  web 
scanners  simultaneously  when  assessing  the 
vulnerabilities of web applications. It is also possible 
to conclude that the security flaws discovered in this 
study  could  be  avoided  if  the  targeted  educational 
institutions  adopted  penetration  testing  in  the 
development,  installation,  configuration,  and 
maintenance  of  network  and/or  application  assets. 
This  study  listed  open-source  tools  (framework 
guides)  that  allow  security  vulnerabilities  and 
intrusion  testing  to  be  carried  out.  These  tools  are 
pretty  effective,  as  it  can  be  said  that  if  Angolan 
universities  regularly  perform  penetration  tests  in 
their  applications  and  or  ecosystems,  the  security 
flaws  identified  here  would  be  discovered  and 
eliminated.  Consequently,  the  web  applications 
would be safer. To the best of our knowledge, this was 
the  first  time  that  a  security  evaluation  of  the  web 
applications  of  the  Angola  universities  took  place, 
and the conclusions reached depict a dark scenario in 
terms  of  web  application  security.  Therefore,  there 
are  essential  steps  that  need  to  take  place  at  the 
Angola  universities  to  include  good  application 
security  practices  in  the  implementation, 
configuration and deployment of these university web 
applications  that  need  to  consider  the  appropriate 
security risks and adopt measures to mitigate them. 
The work described in this paper should be cyclically 
repeated over time to measure the security maturity 
of  such  web  applications,  allowing  for  the 
establishment  of  proper  secure  by  default 
environments.  
REFERENCES 
Acunetix.  (2020).  Web Application Vulnerability Report 
2020.  https://www.acunetix.com/white-papers/acune 
tix-web-application-vulnerability-report-2020/ 
Dinis,  B.,  &  Serrao,  C.  (2014).  External  footprinting 
security assessments: Combining the PTES framework 
with open-source tools to conduct external footprinting 
security  assessments.  International Conference on 
Information Society (i-Society 2014),  313–318. 
https://doi.org/10.1109/i-Society.2014.7009066 
Doshi,  J.,  &  Trivedi,  B.  (2015).  Comparison  of 
vulnerability assessment and penetration testing. Int. J. 
Appl. Inf. Syst, 8(6), 51–54. 
Haubris,  K.  P.,  &  Pauli,  J.  J.  (2013).  Improving  the 
efficiency  and  effectiveness  of  penetration  test 
automation.  2013 10th International Conference on 
Information Technology: New Generations, 387–391.