Spurtcommerce Security Testing Guide
Spurtcommerce Security Testing Guide
Identity
Management Test Name
Testing
Authentication
Test Name
Testing
Authorization
Test Name
Testing
Session
Management Test Name
Testing
Data Validation
Test Name
Testing
Business logic
Test Name
Testing
Objectives
- Verify which accounts may provision other accounts and of what type.
Objectives
- Assess whether any use case of the web site or application causes the
server or the client to exchange credentials without encryption.
- Enumerate the applications for default credentials and validate if they still
exist.
- Review and assess new user accounts and if they are created with any
defaults or identifiable patterns.
- Evaluate the account lockout mechanism's ability to mitigate brute force
password guessing.- Evaluate the unlock mechanism's resistance to
unauthorized account unlocking.
- Ensure that authentication is applied across all services that require it.
- Validate that the generated session is managed securely and do not put the
user's credentials in danger.
Objectives
Objectives
- Gather session tokens, for the same user and for different users where
possible.
- Analyze and ensure that enough randomness exists to stop session forging
attacks.
- Modify cookies that are not signed and contain information that can be
manipulated.
- Assess the logout UI.
- Analyze the session timeout and if the session is properly killed after logout.
Objectives
- Identify injection points where you can inject code into the application.
- Assess the injection severity.
Objectives
- Validate the service configuration.
- Review the digital certificate's cryptographic strength and validity.
- Ensure that the TLS security is not bypassable and is properly implemented
across the application.
Objectives
- Review the project documentation for components of the system that move,
store, or handle data.
- Determine what type of data is logically acceptable by the component and
what types the system should guard against.
- Determine who should be allowed to modify or read that data in each
component.
- Attempt to insert, update, or delete data values used by each component
that should not be allowed per the business logic workflow.
- Review the project documentation for file types that are rejected by the
system.
- Verify that the unwelcomed file types are rejected and handled safely.
- Verify that file batch uploads are secure and do not allow any bypass against
the set security measures.
- Identify the file upload functionality.
- Review the project documentation to identify what file types are considered
acceptable, and what types would be considered dangerous or malicious.
- Determine how the uploaded files are processed.
- Obtain or create a set of malicious files for testing.
- Try to upload the malicious files to the application and determine whether it
is accepted and processed.
Objectives
Objectives
implemented
implemented
implemented
implemented
implemented
implemented
implemented
implemented