SlideShare a Scribd company logo
1 of 11
Download to read offline
1
Cyber Crime / Security Testing
COE - Abstract
By
Author : Mrityunjaya Hikkalgutti
Date : 22 July 2020
Problem Statement : Common IT Applications security vulnerabilities
• Missing data encryption
 OS command injection
 SQL injection
 Buffer overflow
 Missing authentication for critical functions
 Missing authorization
 Unrestricted upload of dangerous file types
 Reliance on untrusted inputs in a security
decision
 Malware
 Backdoors,
 Formjacking,
 Cross-site scripting and forgery
 Download of codes without integrity
checks
 Use of broken algorithms
 URL redirection to untrusted sites
 Path traversal
 Bugs
 Weak passwords
 Software that is already infected with virus
 DDoS (distributed denial-of-service)
attack
 DNS (Domain Name System)
Solution : Cyber Security
Required @
 Critical infrastructure cyber security.
 Network security. ...
 Cloud security. ...
 IoT (Internet of Things) security. ...
 Application security.
 Application Server Security
 Web server Security
 Middleware Security
 Database Security
 Database server Security
Problem Statement : Cybercrimes
 Email and internet fraud.
 Identity fraud (where personal
information is stolen and used).
 Theft of financial or card payment data.
 Theft and sale of corporate data.
 Cyberextortion (demanding money to
prevent a threatened attack).
 Ransomware attacks (a type of
cyberextortion).
 Crypojacking (where hackers mine
cryptocurrency using resources they do
not own).
 Cyberespionage (where hackers access
government or company data).
Security Testing Types
 Scanning(Configuration Scanning)
 Penetration Testing (Ethical Hacking)
 Security Audit
 Risk Assessment Security Posture
Assessment
 Information Gathering
 Port Scanning
 Packet Analyzer/Sniffers
 Vulnerability Scanners
 Proxies
 Exploitation
 Password Cracker
 Web Application Security Testing
 API Security Testing
 Test Internal Interfaces
 Interactive Application Security Testing
(IAST)
 Software Composition Analysis (SCA)
 Security Testing Best Practices.
 Shift Security Testing Left
 Security Testing Best practices
Security Testing Tools
• Static Application Security Testing (SAST)
• Dynamic Application Security Testing (DAST)
• Interactive Application Security Testing
• (IAST) and Hybrid Tools
• Software Composition Analysis (SCA)
Security Testing Tools
Information Gathering
 Skipfish
 NsLookup
 Google Hacking Database Tool (GHDB)
 What is my IP/IP Address Lookup
 HTTrack Website Copier
 Samspade
 Wayback Machine
 The Harvester
 Metagoofil
 Maltego
 Robots.txt
Port Scanning
 Angry IP Scanner
 Pingsweep
 Superscan
 Advance Port Scanner
 Netcat
 Nmap
 Traceroute
Packet Analyzer/Sniffers
 Wireshark
 Ettercap
 Tcpdump
 Kismet
 NetworkMiner
Vulnerability Scanners
 Nessus
 ZAP
 AJAX Spidering
 Fuzzing
 Websocket Testing
 Acuentix
 IBM AppScan
 HP WebInspect
 Fortify Static Code Analyzer
 Burp Professional Scanner
 Netsparker
 Qualys Cloud Platform
 w3af
Exploitation
 Metasploit
 SQL Map
 Havij
 SET (Social Engineer Toolkit)
 BeEF
Password Crackers
 Brutus
 Ophcrack
 John the Ripper
 Cain and Abel
 THC Hydra
 Rainbow Crack
 Truecrack
 Air crack
Proxies
 Paros
 WebScarab
 IE watch
 Charles
Security Testing Tools
Information Gathering
 Skipfish
 NsLookup
 Google Hacking Database Tool (GHDB)
 What is my IP/IP Address Lookup
 HTTrack Website Copier
 Samspade
 Wayback Machine
 The Harvester
 Metagoofil
 Maltego
 Robots.txt
Port Scanning
 Angry IP Scanner
 Pingsweep
 Superscan
 Advance Port Scanner
 Netcat
 Nmap
 Traceroute
Packet Analyzer/Sniffers
 Wireshark
 Ettercap
 Tcpdump
 Kismet
 NetworkMiner
Vulnerability Scanners
 Nessus
 ZAP
 AJAX Spidering
 Fuzzing
 Websocket Testing
 Acuentix
 IBM AppScan
 HP WebInspect
 Fortify Static Code Analyzer
 Burp Professional Scanner
 Netsparker
 Qualys Cloud Platform
 w3af
Exploitation
 Metasploit
 SQL Map
 Havij
 SET (Social Engineer Toolkit)
 BeEF
Password Crackers
 Brutus
 Ophcrack
 John the Ripper
 Cain and Abel
 THC Hydra
 Rainbow Crack
 Truecrack
 Air crack
Proxies
 Paros
 WebScarab
 IE watch
 Charles
DB Testing Tools
• Data Factory
• Mockup Data
• DTM Data Generator
• MS SQL Server
• SQL Test
• Oracle SQL Developer
• NoSQL Unit
• Se Lite
• SLOB
• Orion
DB Security Testing Techniques
• Penetration Testing
• Risk Assessment
• SQL Injection Validation
• Password Cracking
• Security Audit
Benefits of Using Database Testing Tool
• Tool is that it executes tasks faster and this saves time.
• We have both paid as well as opensource testing tools
• These tools can be classified into Load and Performance testing tools,
• Test Generator tools, and SQL-based tools.
• Vulnerability that exists within the database system and using some of these tools will
• Facilitate the detection of defects efficiently and effectively in early stage
• periodic testing is important that will ensure productivity in the system (DB Crashes).
@hjay55
hjay55@gmail.com
+91-9449001859

More Related Content

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Cyber Crime / Security Testing COE - Abstract / White Paper

  • 1. 1 Cyber Crime / Security Testing COE - Abstract By Author : Mrityunjaya Hikkalgutti Date : 22 July 2020
  • 2. Problem Statement : Common IT Applications security vulnerabilities • Missing data encryption  OS command injection  SQL injection  Buffer overflow  Missing authentication for critical functions  Missing authorization  Unrestricted upload of dangerous file types  Reliance on untrusted inputs in a security decision  Malware  Backdoors,  Formjacking,  Cross-site scripting and forgery  Download of codes without integrity checks  Use of broken algorithms  URL redirection to untrusted sites  Path traversal  Bugs  Weak passwords  Software that is already infected with virus  DDoS (distributed denial-of-service) attack  DNS (Domain Name System)
  • 3. Solution : Cyber Security Required @  Critical infrastructure cyber security.  Network security. ...  Cloud security. ...  IoT (Internet of Things) security. ...  Application security.  Application Server Security  Web server Security  Middleware Security  Database Security  Database server Security Problem Statement : Cybercrimes  Email and internet fraud.  Identity fraud (where personal information is stolen and used).  Theft of financial or card payment data.  Theft and sale of corporate data.  Cyberextortion (demanding money to prevent a threatened attack).  Ransomware attacks (a type of cyberextortion).  Crypojacking (where hackers mine cryptocurrency using resources they do not own).  Cyberespionage (where hackers access government or company data).
  • 4.
  • 5. Security Testing Types  Scanning(Configuration Scanning)  Penetration Testing (Ethical Hacking)  Security Audit  Risk Assessment Security Posture Assessment  Information Gathering  Port Scanning  Packet Analyzer/Sniffers  Vulnerability Scanners  Proxies  Exploitation  Password Cracker  Web Application Security Testing  API Security Testing  Test Internal Interfaces  Interactive Application Security Testing (IAST)  Software Composition Analysis (SCA)  Security Testing Best Practices.  Shift Security Testing Left  Security Testing Best practices
  • 6. Security Testing Tools • Static Application Security Testing (SAST) • Dynamic Application Security Testing (DAST) • Interactive Application Security Testing • (IAST) and Hybrid Tools • Software Composition Analysis (SCA)
  • 7. Security Testing Tools Information Gathering  Skipfish  NsLookup  Google Hacking Database Tool (GHDB)  What is my IP/IP Address Lookup  HTTrack Website Copier  Samspade  Wayback Machine  The Harvester  Metagoofil  Maltego  Robots.txt Port Scanning  Angry IP Scanner  Pingsweep  Superscan  Advance Port Scanner  Netcat  Nmap  Traceroute Packet Analyzer/Sniffers  Wireshark  Ettercap  Tcpdump  Kismet  NetworkMiner Vulnerability Scanners  Nessus  ZAP  AJAX Spidering  Fuzzing  Websocket Testing  Acuentix  IBM AppScan  HP WebInspect  Fortify Static Code Analyzer  Burp Professional Scanner  Netsparker  Qualys Cloud Platform  w3af Exploitation  Metasploit  SQL Map  Havij  SET (Social Engineer Toolkit)  BeEF Password Crackers  Brutus  Ophcrack  John the Ripper  Cain and Abel  THC Hydra  Rainbow Crack  Truecrack  Air crack Proxies  Paros  WebScarab  IE watch  Charles
  • 8. Security Testing Tools Information Gathering  Skipfish  NsLookup  Google Hacking Database Tool (GHDB)  What is my IP/IP Address Lookup  HTTrack Website Copier  Samspade  Wayback Machine  The Harvester  Metagoofil  Maltego  Robots.txt Port Scanning  Angry IP Scanner  Pingsweep  Superscan  Advance Port Scanner  Netcat  Nmap  Traceroute Packet Analyzer/Sniffers  Wireshark  Ettercap  Tcpdump  Kismet  NetworkMiner Vulnerability Scanners  Nessus  ZAP  AJAX Spidering  Fuzzing  Websocket Testing  Acuentix  IBM AppScan  HP WebInspect  Fortify Static Code Analyzer  Burp Professional Scanner  Netsparker  Qualys Cloud Platform  w3af Exploitation  Metasploit  SQL Map  Havij  SET (Social Engineer Toolkit)  BeEF Password Crackers  Brutus  Ophcrack  John the Ripper  Cain and Abel  THC Hydra  Rainbow Crack  Truecrack  Air crack Proxies  Paros  WebScarab  IE watch  Charles
  • 9. DB Testing Tools • Data Factory • Mockup Data • DTM Data Generator • MS SQL Server • SQL Test • Oracle SQL Developer • NoSQL Unit • Se Lite • SLOB • Orion DB Security Testing Techniques • Penetration Testing • Risk Assessment • SQL Injection Validation • Password Cracking • Security Audit
  • 10. Benefits of Using Database Testing Tool • Tool is that it executes tasks faster and this saves time. • We have both paid as well as opensource testing tools • These tools can be classified into Load and Performance testing tools, • Test Generator tools, and SQL-based tools. • Vulnerability that exists within the database system and using some of these tools will • Facilitate the detection of defects efficiently and effectively in early stage • periodic testing is important that will ensure productivity in the system (DB Crashes).