SlideShare a Scribd company logo
Copyright © 2019 ONE BCG. All rights reserved.
Security Testing - Processes &
Techniques
2
Copyright © 2019 ONE BCG. All rights reserved.
• Why security testing is important?
• What is security testing
• Examples of security flaws in an application
• How does Security Testing add value to organizations?
• Types of Security Testing
• Security Testing Techniques
• Security Testing Tools
Agenda
3
Copyright © 2019 ONE BCG. All rights reserved.
Sensitive information like User Name/
Passwords,Credit/Debit card details or
private information stored online.
Security testing is to recognize the threats
in the system and measure its possible
vulnerabilities, so the system does not stop
functioning or is exploited.
Why Security Testing is Important?
4
Copyright © 2019 ONE BCG. All rights reserved.
• It ensures software applications are free from any vulnerabilities, threats, risks that
may cause a big loss.
• It is about finding all possible loopholes and weaknesses of the system which might
result in a loss of information or revenue.
• The goal of security testing is to identify the threats in the system and measure its
potential vulnerabilities, so the system does not stop functioning or is exploited.
• It also helps in detecting all possible security risks in the system and help developers
in fixing these problems through coding.
What is security testing?
5
Copyright © 2019 ONE BCG. All rights reserved.
• A Student Management System is insecure if the ‘Admission’ branch can edit the data
of ‘Exam’ branch
• An ERP system is not secure if DEO (data entry operator) can generate ‘Reports’
• An online Shopping Mall has no security if the customer’s Credit Card Detail is not
encrypted
• A custom software possess inadequate security if an SQL query retrieves actual
passwords of its users
Examples of security flaws in an application
6
Copyright © 2019 ONE BCG. All rights reserved.
• In today’s interconnected world with consumers depending more on online channels
to make transactions, any security breaches lead to a loss in customer confidence
and ultimately revenue.
• As security attacks have grown exponentially, security testing is the only discipline
that helps an organization identify where they are vulnerable and take corrective
measures to prevent as well rectifies the gaps in security.
• More and more organizations are getting the security audits done and testing
measures to ensure that the critical applications are shielded from any breaches or
unintended penetration.
Security Testing add value to organizations
7
Copyright © 2019 ONE BCG. All rights reserved.
Types of Security Testing
8
Copyright © 2019 ONE BCG. All rights reserved.
• Vulnerability testing:
– The automated computer program to proactively identify security vulnerabilities
of computing systems in a network to determine where a system can be exploited
and/or threatened.
– Generally done through various vulnerability scanning software. Ex: OpenVas,
Nessus, ZAP, Vega, and ISS.
– https://www.youtube.com/watch?v=koMo_fSQGlk
• Security Scanning
– This is a program that communicates with a web application through the web
front-end to identify potential security vulnerabilities in the web application, OS
and Networks.
9
Copyright © 2019 ONE BCG. All rights reserved.
• Penetration Testing
– A penetration test is an attack on a computer system to find security loopholes,
potentially gaining access to it, its functionality and data.
– Tester may try to enter into the application / system with the help of some other
application or with the help of combinations of loopholes that the application
has kept open unknowingly.
– It is the most effective way to practically find out potential loopholes in the
application
10
Copyright © 2019 ONE BCG. All rights reserved.
• Risk Assessment
– This is a process of assessing and deciding on the risk involved with the type of
loss and the possibility of vulnerability occurrence.
– This is determined within the organization by various interviews, discussions
and analysis.
• Security Auditing
– Security Auditing involves hands on internal inspection of Operating Systems
and Applications, often via line-by-line inspection of the code.
– A security audit is a systematic evaluation of the security of a company's
information system.
11
Copyright © 2019 ONE BCG. All rights reserved.
• Posture Assessment
– It combines Security Scanning, Ethical Hacking and Risk Assessments to show
an overall Security Posture of the organization.
• Ethical hacking
– Ethical Hacking involves number of penetration tests over the wide network on
the system under test. It is conducted by ethical hackers to find possible
problems in the system.
12
Copyright © 2019 ONE BCG. All rights reserved.
• Access to the Application
– Authentication:
Example: Some of the authentication tests include a test for
password quality rules, test for default logins, test for password
recovery, test captcha, test for logout functionality, test for
password change, test for security question/answer, etc.
– Authorization:
Example: Some of the authorization tests include a test for path
traversal, test for missing authorization, test for horizontal access
control problems, etc.
Security Testing Techniques
13
Copyright © 2019 ONE BCG. All rights reserved.
• Data Protection
– Data Manipulation
• In data manipulation, a hacker changes data used by a website to gain some
advantage or to embarrass the website’s owners. Hackers will often gain
access to HTML pages and change them to be satirical or offensive.
• Tools: Fidler, Charles Proxy, Web Sniffer, Burp Suite
• https://www.youtube.com/watch?v=8bo5kXMAcV0
– URL Manipulation
• URL manipulation is the process of manipulating the website URL query
strings & capture of important information by hackers. This happens when
the application uses the HTTP GET method to pass information -
14
Copyright © 2019 ONE BCG. All rights reserved.
between the client and the server. The information is passed in parameters in the query
string. The tester can modify a parameter value in the query string to check if the server
accepts it.
- File Uploads
• Only valid files should be permitted for uploading.
• http://demo.guru99.com/Security/SEC_V1/customer/contactus.php
• In the above link the upload file menu, currently accepts any file format
including .exe, PHP, Js, etc.
• A malicious user can upload a virus or executable file and using The file
size should also be checked so that users do not upload large files that
would eat up the server space.
15
Copyright © 2019 ONE BCG. All rights reserved.
● Command Execution
– SQL Injection:
• SQL Injection constructs illegal SQL statements on a web site application
from user-supplied input.
• https://www.guru99.com/learn-sql-injection-with-practical-example.html
• https://www.youtube.com/watch?v=WFFQw01EYHM
– Buffer Overflow:
• Buffer Overflow occurs when a program or process tries to store more data
in a buffer (temporary data storage area) than it was intended to hold.
• https://www.youtube.com/watch?v=mTrTwg03N9M
16
Copyright © 2019 ONE BCG. All rights reserved.
• Client-Side Attack
– Content Spoofing :
• Content Spoofing tricks a user into believing that certain content appearing
on a website is legitimate and not from an external source
• https://www.geeksforgeeks.org/content-spoofing/
– Cross-Site Scripting :
• Cross-site Scripting (XSS) forces a web site to echo attacker-supplied
executable code, which loads into a user’s browser.
• https://www.acunetix.com/websitesecurity/cross-site-scripting/
• https://www.youtube.com/watch?v=cbmBDiR6WaY
17
Copyright © 2019 ONE BCG. All rights reserved.
• Brute Force Attack
– Brute Force Attack aims at being the simplest kind of method to gain access to a
site: it tries usernames and passwords, over and over again, until it gets in.
– The most obvious way to block brute-force attacks is to simply lock out
accounts after a defined number of incorrect password attempts.
– https://www.youtube.com/watch?v=25cazx5D_vw
18
Copyright © 2019 ONE BCG. All rights reserved.
• DOS Attack
– A denial of service (DoS) attack is a malicious attempt to make a server or a
network resource unavailable to users.
– Consider a functionality (such as registration) which typically does not require
authentication. An attacker can easily place a heavy load on the server by
simulating multiple registration operations and by feeding in arbitrarily huge
input data through the registration fields, thus placing a further load on the
server and also consuming database connections. This could cause the server to
crash or slow down to a crawl.
19
Copyright © 2019 ONE BCG. All rights reserved.
• Forceful Browsing
– A malicious user can access the complete application from different browsers
without login.
– How to perform: Log in to an application then copy the URL now paste it in
another browser and check whether the user is logging in or redirected to the
login page.
– Recommendation: The application must implement proper session/cookie
management on the server-side, to ensure strict access control. This would avoid
any user indirectly copy-pasting of the link to get unauthorized access into the
internal pages.
20
Copyright © 2019 ONE BCG. All rights reserved.
• Spoofing
– Website/Email Id/Caller Id/IP Address/Mac Address/DNS/GPS Location
– https://www.youtube.com/watch?v=YKH2VJvQJfc
• Session Management
– A web session is a sequence of the HTTP request and response transactions
linked with the same user. The session management tests check how session
management is handled in the web app.
– You can test for session expiry after particular idle time, session termination
after maximum lifetime, session termination after log out, check for session
cookie scope and duration, testing if a single user can have multiple
simultaneous sessions, etc.
21
Copyright © 2019 ONE BCG. All rights reserved.
• Phishing Attack
– It is a technique that uses trickery and deceit to obtain private data from users.
– A hacker may try to impersonate a genuine website such as yahoo and then ask
the unsuspecting user to confirm their account name and password.
– This technique could also be used to get credit card information or any other
valuable personal data.
22
Copyright © 2019 ONE BCG. All rights reserved.
• Session Timeout.
• A session should terminate when the user is gone through an error page.
• Autofill should be off.
• Check whether an application is able to view the authenticated page using the back
button of the browser.
• Check whether It is possible to view the contents of the authenticated pages by fetching
the page from the browser cache memory and history.
• Users should not have the option to remember the password as this may give
unauthorized access to malicious users.
Other Security Checks
23
Copyright © 2019 ONE BCG. All rights reserved.
• OpenVas: This tool is used for Vulnerability Testing
• Websecurity: This tool is used for Vulnerability Testing
• Wapity: This tool is used for Vulnerability Testing
• Vega: This tool is used for Vulnerability Testing
• Zed Attack Proxy(ZAP): This tool is used for Penetration Testing
• Iron Wasp: This tool is used for Vulnerability Testing
• SQLMap: This tool is used for SQL Injection
• BeEF(Browser Exploitation Framework): This tool is used for Penetration Testing
Security Testing Tools
24
Copyright © 2019 ONE BCG. All rights reserved.

More Related Content

What's hot

Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
Hina Rawal
 
5 Important Secure Coding Practices
5 Important Secure Coding Practices5 Important Secure Coding Practices
5 Important Secure Coding Practices
Thomas Kurian Ambattu,CRISC,ISLA-2011 (ISC)²
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
HackerOne
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
vodQA
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
PECB
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 

What's hot (20)

Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
5 Important Secure Coding Practices
5 Important Secure Coding Practices5 Important Secure Coding Practices
5 Important Secure Coding Practices
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
OWASP Top Ten
OWASP Top TenOWASP Top Ten
OWASP Top Ten
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 

Similar to What is security testing and why it is so important?

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
Security Testing
Security TestingSecurity Testing
Security TestingISsoft
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
software-engineering-book
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
 
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
daniahendric
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
DrBasemMohamedElomda
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
Alwin Thayyil
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
Tommy Zul Hidayat
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
IRJET Journal
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web Apps
Mark Garratt
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
sarah david
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docx
toddr4
 

Similar to What is security testing and why it is so important? (20)

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web Apps
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docx
 

More from ONE BCG

A comprehensive guide to user behavioral analytics
A comprehensive guide to user behavioral analytics A comprehensive guide to user behavioral analytics
A comprehensive guide to user behavioral analytics
ONE BCG
 
What is product development and its process?
What is product development and its process?What is product development and its process?
What is product development and its process?
ONE BCG
 
Why effective communication with clients is necessary?
Why effective communication with clients is necessary?Why effective communication with clients is necessary?
Why effective communication with clients is necessary?
ONE BCG
 
An ultimate guide to SOLID Principles, developers must know.
An ultimate guide to SOLID Principles, developers must know.An ultimate guide to SOLID Principles, developers must know.
An ultimate guide to SOLID Principles, developers must know.
ONE BCG
 
How Artificial intelligence and machine learning are different?
How Artificial intelligence and machine learning are different? How Artificial intelligence and machine learning are different?
How Artificial intelligence and machine learning are different?
ONE BCG
 
What is Agile and Scrum, their guiding principles and methods?
What is Agile and Scrum, their guiding principles and methods?What is Agile and Scrum, their guiding principles and methods?
What is Agile and Scrum, their guiding principles and methods?
ONE BCG
 
Prototype: Its methods, techniques, and key features.
Prototype: Its methods, techniques, and key features.Prototype: Its methods, techniques, and key features.
Prototype: Its methods, techniques, and key features.
ONE BCG
 
How to prepare a project for automated deployment?
How to prepare a project for automated deployment?How to prepare a project for automated deployment?
How to prepare a project for automated deployment?
ONE BCG
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
ONE BCG
 
Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
ONE BCG
 
Brushing skills on SignalR for ASP.NET developers
Brushing skills on SignalR for ASP.NET developersBrushing skills on SignalR for ASP.NET developers
Brushing skills on SignalR for ASP.NET developers
ONE BCG
 

More from ONE BCG (11)

A comprehensive guide to user behavioral analytics
A comprehensive guide to user behavioral analytics A comprehensive guide to user behavioral analytics
A comprehensive guide to user behavioral analytics
 
What is product development and its process?
What is product development and its process?What is product development and its process?
What is product development and its process?
 
Why effective communication with clients is necessary?
Why effective communication with clients is necessary?Why effective communication with clients is necessary?
Why effective communication with clients is necessary?
 
An ultimate guide to SOLID Principles, developers must know.
An ultimate guide to SOLID Principles, developers must know.An ultimate guide to SOLID Principles, developers must know.
An ultimate guide to SOLID Principles, developers must know.
 
How Artificial intelligence and machine learning are different?
How Artificial intelligence and machine learning are different? How Artificial intelligence and machine learning are different?
How Artificial intelligence and machine learning are different?
 
What is Agile and Scrum, their guiding principles and methods?
What is Agile and Scrum, their guiding principles and methods?What is Agile and Scrum, their guiding principles and methods?
What is Agile and Scrum, their guiding principles and methods?
 
Prototype: Its methods, techniques, and key features.
Prototype: Its methods, techniques, and key features.Prototype: Its methods, techniques, and key features.
Prototype: Its methods, techniques, and key features.
 
How to prepare a project for automated deployment?
How to prepare a project for automated deployment?How to prepare a project for automated deployment?
How to prepare a project for automated deployment?
 
What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?What is Load, Stress and Endurance Testing?
What is Load, Stress and Endurance Testing?
 
Software risk analysis and management
Software risk analysis and managementSoftware risk analysis and management
Software risk analysis and management
 
Brushing skills on SignalR for ASP.NET developers
Brushing skills on SignalR for ASP.NET developersBrushing skills on SignalR for ASP.NET developers
Brushing skills on SignalR for ASP.NET developers
 

Recently uploaded

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

What is security testing and why it is so important?

  • 1. Copyright © 2019 ONE BCG. All rights reserved. Security Testing - Processes & Techniques
  • 2. 2 Copyright © 2019 ONE BCG. All rights reserved. • Why security testing is important? • What is security testing • Examples of security flaws in an application • How does Security Testing add value to organizations? • Types of Security Testing • Security Testing Techniques • Security Testing Tools Agenda
  • 3. 3 Copyright © 2019 ONE BCG. All rights reserved. Sensitive information like User Name/ Passwords,Credit/Debit card details or private information stored online. Security testing is to recognize the threats in the system and measure its possible vulnerabilities, so the system does not stop functioning or is exploited. Why Security Testing is Important?
  • 4. 4 Copyright © 2019 ONE BCG. All rights reserved. • It ensures software applications are free from any vulnerabilities, threats, risks that may cause a big loss. • It is about finding all possible loopholes and weaknesses of the system which might result in a loss of information or revenue. • The goal of security testing is to identify the threats in the system and measure its potential vulnerabilities, so the system does not stop functioning or is exploited. • It also helps in detecting all possible security risks in the system and help developers in fixing these problems through coding. What is security testing?
  • 5. 5 Copyright © 2019 ONE BCG. All rights reserved. • A Student Management System is insecure if the ‘Admission’ branch can edit the data of ‘Exam’ branch • An ERP system is not secure if DEO (data entry operator) can generate ‘Reports’ • An online Shopping Mall has no security if the customer’s Credit Card Detail is not encrypted • A custom software possess inadequate security if an SQL query retrieves actual passwords of its users Examples of security flaws in an application
  • 6. 6 Copyright © 2019 ONE BCG. All rights reserved. • In today’s interconnected world with consumers depending more on online channels to make transactions, any security breaches lead to a loss in customer confidence and ultimately revenue. • As security attacks have grown exponentially, security testing is the only discipline that helps an organization identify where they are vulnerable and take corrective measures to prevent as well rectifies the gaps in security. • More and more organizations are getting the security audits done and testing measures to ensure that the critical applications are shielded from any breaches or unintended penetration. Security Testing add value to organizations
  • 7. 7 Copyright © 2019 ONE BCG. All rights reserved. Types of Security Testing
  • 8. 8 Copyright © 2019 ONE BCG. All rights reserved. • Vulnerability testing: – The automated computer program to proactively identify security vulnerabilities of computing systems in a network to determine where a system can be exploited and/or threatened. – Generally done through various vulnerability scanning software. Ex: OpenVas, Nessus, ZAP, Vega, and ISS. – https://www.youtube.com/watch?v=koMo_fSQGlk • Security Scanning – This is a program that communicates with a web application through the web front-end to identify potential security vulnerabilities in the web application, OS and Networks.
  • 9. 9 Copyright © 2019 ONE BCG. All rights reserved. • Penetration Testing – A penetration test is an attack on a computer system to find security loopholes, potentially gaining access to it, its functionality and data. – Tester may try to enter into the application / system with the help of some other application or with the help of combinations of loopholes that the application has kept open unknowingly. – It is the most effective way to practically find out potential loopholes in the application
  • 10. 10 Copyright © 2019 ONE BCG. All rights reserved. • Risk Assessment – This is a process of assessing and deciding on the risk involved with the type of loss and the possibility of vulnerability occurrence. – This is determined within the organization by various interviews, discussions and analysis. • Security Auditing – Security Auditing involves hands on internal inspection of Operating Systems and Applications, often via line-by-line inspection of the code. – A security audit is a systematic evaluation of the security of a company's information system.
  • 11. 11 Copyright © 2019 ONE BCG. All rights reserved. • Posture Assessment – It combines Security Scanning, Ethical Hacking and Risk Assessments to show an overall Security Posture of the organization. • Ethical hacking – Ethical Hacking involves number of penetration tests over the wide network on the system under test. It is conducted by ethical hackers to find possible problems in the system.
  • 12. 12 Copyright © 2019 ONE BCG. All rights reserved. • Access to the Application – Authentication: Example: Some of the authentication tests include a test for password quality rules, test for default logins, test for password recovery, test captcha, test for logout functionality, test for password change, test for security question/answer, etc. – Authorization: Example: Some of the authorization tests include a test for path traversal, test for missing authorization, test for horizontal access control problems, etc. Security Testing Techniques
  • 13. 13 Copyright © 2019 ONE BCG. All rights reserved. • Data Protection – Data Manipulation • In data manipulation, a hacker changes data used by a website to gain some advantage or to embarrass the website’s owners. Hackers will often gain access to HTML pages and change them to be satirical or offensive. • Tools: Fidler, Charles Proxy, Web Sniffer, Burp Suite • https://www.youtube.com/watch?v=8bo5kXMAcV0 – URL Manipulation • URL manipulation is the process of manipulating the website URL query strings & capture of important information by hackers. This happens when the application uses the HTTP GET method to pass information -
  • 14. 14 Copyright © 2019 ONE BCG. All rights reserved. between the client and the server. The information is passed in parameters in the query string. The tester can modify a parameter value in the query string to check if the server accepts it. - File Uploads • Only valid files should be permitted for uploading. • http://demo.guru99.com/Security/SEC_V1/customer/contactus.php • In the above link the upload file menu, currently accepts any file format including .exe, PHP, Js, etc. • A malicious user can upload a virus or executable file and using The file size should also be checked so that users do not upload large files that would eat up the server space.
  • 15. 15 Copyright © 2019 ONE BCG. All rights reserved. ● Command Execution – SQL Injection: • SQL Injection constructs illegal SQL statements on a web site application from user-supplied input. • https://www.guru99.com/learn-sql-injection-with-practical-example.html • https://www.youtube.com/watch?v=WFFQw01EYHM – Buffer Overflow: • Buffer Overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. • https://www.youtube.com/watch?v=mTrTwg03N9M
  • 16. 16 Copyright © 2019 ONE BCG. All rights reserved. • Client-Side Attack – Content Spoofing : • Content Spoofing tricks a user into believing that certain content appearing on a website is legitimate and not from an external source • https://www.geeksforgeeks.org/content-spoofing/ – Cross-Site Scripting : • Cross-site Scripting (XSS) forces a web site to echo attacker-supplied executable code, which loads into a user’s browser. • https://www.acunetix.com/websitesecurity/cross-site-scripting/ • https://www.youtube.com/watch?v=cbmBDiR6WaY
  • 17. 17 Copyright © 2019 ONE BCG. All rights reserved. • Brute Force Attack – Brute Force Attack aims at being the simplest kind of method to gain access to a site: it tries usernames and passwords, over and over again, until it gets in. – The most obvious way to block brute-force attacks is to simply lock out accounts after a defined number of incorrect password attempts. – https://www.youtube.com/watch?v=25cazx5D_vw
  • 18. 18 Copyright © 2019 ONE BCG. All rights reserved. • DOS Attack – A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users. – Consider a functionality (such as registration) which typically does not require authentication. An attacker can easily place a heavy load on the server by simulating multiple registration operations and by feeding in arbitrarily huge input data through the registration fields, thus placing a further load on the server and also consuming database connections. This could cause the server to crash or slow down to a crawl.
  • 19. 19 Copyright © 2019 ONE BCG. All rights reserved. • Forceful Browsing – A malicious user can access the complete application from different browsers without login. – How to perform: Log in to an application then copy the URL now paste it in another browser and check whether the user is logging in or redirected to the login page. – Recommendation: The application must implement proper session/cookie management on the server-side, to ensure strict access control. This would avoid any user indirectly copy-pasting of the link to get unauthorized access into the internal pages.
  • 20. 20 Copyright © 2019 ONE BCG. All rights reserved. • Spoofing – Website/Email Id/Caller Id/IP Address/Mac Address/DNS/GPS Location – https://www.youtube.com/watch?v=YKH2VJvQJfc • Session Management – A web session is a sequence of the HTTP request and response transactions linked with the same user. The session management tests check how session management is handled in the web app. – You can test for session expiry after particular idle time, session termination after maximum lifetime, session termination after log out, check for session cookie scope and duration, testing if a single user can have multiple simultaneous sessions, etc.
  • 21. 21 Copyright © 2019 ONE BCG. All rights reserved. • Phishing Attack – It is a technique that uses trickery and deceit to obtain private data from users. – A hacker may try to impersonate a genuine website such as yahoo and then ask the unsuspecting user to confirm their account name and password. – This technique could also be used to get credit card information or any other valuable personal data.
  • 22. 22 Copyright © 2019 ONE BCG. All rights reserved. • Session Timeout. • A session should terminate when the user is gone through an error page. • Autofill should be off. • Check whether an application is able to view the authenticated page using the back button of the browser. • Check whether It is possible to view the contents of the authenticated pages by fetching the page from the browser cache memory and history. • Users should not have the option to remember the password as this may give unauthorized access to malicious users. Other Security Checks
  • 23. 23 Copyright © 2019 ONE BCG. All rights reserved. • OpenVas: This tool is used for Vulnerability Testing • Websecurity: This tool is used for Vulnerability Testing • Wapity: This tool is used for Vulnerability Testing • Vega: This tool is used for Vulnerability Testing • Zed Attack Proxy(ZAP): This tool is used for Penetration Testing • Iron Wasp: This tool is used for Vulnerability Testing • SQLMap: This tool is used for SQL Injection • BeEF(Browser Exploitation Framework): This tool is used for Penetration Testing Security Testing Tools
  • 24. 24 Copyright © 2019 ONE BCG. All rights reserved.