Security Testing Mat
Security Testing Mat
Web application:
Web application are applications delivered to users via a web-server over a network
such as the Internet or intranet.
Application
Presentation
Layer
Business Logic
Layer
Database Layer
Application Framework :
Web server is a central depository in the form of a computer that is used to
store web document and allow access to user.
--> A web server provide services to a client (browser) .
--> Generally communication takes place through HTTP or HTTP protocol.
--> A request is sent by client to the server for specific document or implementation of some data. The
server process the request and send response to the client.
Vulnerabilities:
Weakness in a system that may threaten the confidentiality ,integrity and availability.
Threat:
It is a condition or circumstance that could potentially cause harm ,damage or compromise to
an IT asset.
Risk:
probability of threat becoming a real ,and the corresponding potential damage.
Vulnerabilities
List
Penetration
Testing
Communication Channel:-
Protocol –HTTP ,HTTPS
Vulnerable Port- eg. Telnet, Ftp , SMTP
Firewall
HTTP:
-->HTTP-Hypertext Transfer Protocol
-->It uses port no.80
-->It send Request in plain text format.
HTTPS:
-->HTTPS-Hypertext Transfer Protocol Secure
-->It uses port no.443
-->It uses “SSL” to send Request
Vulnerable ports:-
Telnet:-
use for Remote Login .
Port no 23
FTP:-
Use for Downloading or Uploading Files.
Port no 21
Firewall:-
Firewall is used to restrict access to one network from another network. They
may also use firewall to restrict one internal network segment from accessing another network
segment.
XSS Protection:-
Protect your application from XSS attacks
1. Input Validation
2. Filter output by converting text/data which might have dangerous HTML characters to its encoded
format:
'<' and '>' to '<' and '>’
'(' and ')' to '(' and ')’
'#' and '&' to '#' and '&‘
3. Recommend filtering on input as much as possible.
SQL injection:-
--> SQL injection is a type of security exploit in which attacker adds SQL code to a web form input
box .
--> To gain access to resources or make changes in the database an SQL query is a request for some
action to be perform on Database.
--> Using SQL Injection attacker can “Bypass the Login Page”
--> Using SQL injection attacker can make changes in the Database.
Session hijacking:-
The term session hijacking refers to the exploitation of a valid computer session -
sometimes also called a session key - to gain unauthorized access to information or services in a
computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a
user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to
maintain a session on many web sites can be easily stolen by an attacker using an intermediary
computer or with access to the saved cookies on the victim's computer.
OWASP Top 10
Vulnerability Assessment Scanning
Vulnerability
AppScan
Open Source Tools