SlideShare a Scribd company logo
S ECURITY T ESTING FOR W EB
 AND M OBILE D EVELOPMENT
            Prepared by: Jyothi Venugopalan
                  (QA Team Member)
             BOSS Webtech Private Limited
               www.bosswebtech.com
S ECURITY T ESTING
๏‚ฅ   The security testing is performed to check
    whether there is any information leakage in
    the sense by encrypting the application.


๏‚ฅ   Security testing is a process to determine that
    an information system protects data and
    maintains functionality as intended.
S ECURITY T ESTING
๏‚ฅ   The six basic security concepts:
    ๏‚ค   Authentication - It allows a receiver to have confidence that information it
        receives originated from a specific known source.

    ๏‚ค   Authorization - Determining that a requester is allowed to receive a service
        or perform an operation.

    ๏‚ค   Confidentiality - A security measure which protects the disclosure of data or
        information to parties other than the intended.

    ๏‚ค   Integrity โ€“ Whether the intended receiver receives the information or data
        which is not altered in transmission.

    ๏‚ค   Non-repudiation - Interchange of authentication information with some form
        of provable time stamp e.g. with session id etc.

    ๏‚ค   Availability - Assuring information and communications services will be ready
        for use when expected.
N EED           OF       S ECURITY
                  T ESTING
๏‚ฅ   Security test helps in finding out loopholes that can
    cause loss of important information and allow any
    intruder enter into the systems.

๏‚ฅ   Security Testing helps in improving the current
    system.

๏‚ฅ   Ensures that the system will work for longer time.

๏‚ฅ   Ensures that people in your organization understand
    and obey security policies.
D IFFERENT T YPES OF
         S ECURITY T ESTING
๏‚ฅ   Security Auditing: Security Auditing includes direct inspection of
    the application developed and Operating Systems. This also
    involves code walk-through.
๏‚ฅ   Security Scanning: It is all about scanning and verification of the
    system and applications.
๏‚ฅ   Vulnerability Scanning: Vulnerability scanning involves scanning
    of the application for all known vulnerabilities.
๏‚ฅ   Risk Assessment: Risk assessment is a method of analyzing and
    deciding the risk that depends upon the type of loss and the
    possibility of loss occurrence.
๏‚ฅ   Penetration Testing: In this type of testing, a tester tries to
    forcibly access and enter the application under test.
๏‚ฅ   Ethical Hacking: Itโ€™s a forced intrusion of an external element
    into the system & applications that are under Security Testing.
S ECURITY T HREATS                             FOR
            W EBSITE
๏‚ฅ   SQL Injection - Insertion of the SQL query
    into the web application which can directly
    interact with the backend database on
    server to reveal information stored in it.

๏‚ฅ   Cross Site Scripting- Insertion of the
    scripting code into client browser. So when
    client send data to server database,
    scripting code on client side get stored into
    the server database.
S ECURITY T HREATS   FOR
       W EBSITE
S ECURITY T ESTING
A PPROACH FOR W EBSITE
๏‚ฅ   Password cracking: In order to log in to the private areas of the
    application, one can either guess a username/ password or use
    some password cracker tool for the same.

๏‚ฅ   URL manipulation through HTTP GET methods: The tester
    should check if the application passes important information in
    the querystring.

๏‚ฅ   SQL Injection: Entering a single quote (โ€˜) in any textbox should
    be rejected by the application.

๏‚ฅ   Cross Site Scripting (XSS): Any HTML e.g. <HTML> or any script
    e.g. <SCRIPT> should not be accepted by the application.
S ECURITY T HREATS FOR
      M OBILE A PPLICATION
๏‚ฅ   Mobile malware and viruses: A mobile virus is an
    electronic virus that targets mobile phones or wireless-
    enabled PDAs.

๏‚ฅ   Eavesdropping: Eavesdropping is the unauthorized real-time
    interception of a private communication, such as a phone call,
    instant message etc.

๏‚ฅ   Unauthorized access: careful attention needs to be paid to
    AAA โ€“ authentication, authorization, and accounting.

๏‚ฅ   Physical security: While many notebook computers are indeed
    lost or stolen every year, it's a lot easier to simply misplace a
    mobile device.
S ECURITY T ESTING A PPROACH
   FOR M OBILE A PPLICATION
๏‚ฅ   Authentication checks

๏‚ฅ   Input Validation checks

๏‚ฅ   Session Management checks

๏‚ฅ   Encryption checks

๏‚ฅ   Application checks

๏‚ฅ   SQL injection checks

๏‚ฅ   LDAP injection checks

๏‚ฅ   XPATH injection checks
S ECURITY T ESTING TOOLS
๏‚ฅ   Netsparker Community Edition
๏‚ฅ   Websecurify
๏‚ฅ   Wapiti
๏‚ฅ   N-Stalker
๏‚ฅ   skipfish
๏‚ฅ   Scrawler
๏‚ฅ   Watcher
๏‚ฅ   x5s
๏‚ฅ   Exploit-Me
๏‚ฅ   WebScarab
S UMMARY
๏‚ฅ   No Website is 100% Secure. Prevention is the better way to
    secure the website.

๏‚ฅ   Security Vulnerability arise on different ways which up on
    risks.

๏‚ฅ   The Critical risk is attacking the website and stealing the
    data.
Security Testing
A BOUT BOSS W EBTECH
๏‚ฅ   BOSS Webtech is a process oriented design house specializing
    in web design, web development, backend web programming,
    mobile application development and other web and mobile
    related design and support services.

๏‚ฅ   Recently launched BizPlus โ€“ Mobile based survey software.
    Check it more here http://bizplusonline.com/

๏‚ฅ   More products here
    http://www.bosswebtech.com/products/products.html

    CONTACT BOSS WEBTECH

๏‚ฅ   Call 831-998-9121 at US EST/CST/MST/PST Zone
    or email info@bosswebtech.com
Ad

More Related Content

What's hot (20)

Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
ย 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
ย 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
Claranet UK
ย 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
Prahlad Reddy
ย 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
ย 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
ย 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
ย 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
ย 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
Ezhilan Elangovan (Eril)
ย 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
Prathan Phongthiproek
ย 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Edureka!
ย 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
ย 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
ย 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
ย 
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
United Security Providers AG
ย 
Oh, WASP! Security Essentials for Web Apps
Oh, WASP! Security Essentials for Web AppsOh, WASP! Security Essentials for Web Apps
Oh, WASP! Security Essentials for Web Apps
TechWell
ย 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
Virtue Security
ย 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
ย 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
ย 
1. penetration-testing-cyber51
1. penetration-testing-cyber511. penetration-testing-cyber51
1. penetration-testing-cyber51
Doree Garcia, CCNA, OSWP
ย 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
ย 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
ย 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
Claranet UK
ย 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
Prahlad Reddy
ย 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
ย 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
ย 
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Software Guru
ย 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
ย 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
Prathan Phongthiproek
ย 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
Edureka!
ย 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
ย 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
ย 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
ย 
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
USP SES and the Location Layer: Geolocation for adaptive Access Control and P...
United Security Providers AG
ย 
Oh, WASP! Security Essentials for Web Apps
Oh, WASP! Security Essentials for Web AppsOh, WASP! Security Essentials for Web Apps
Oh, WASP! Security Essentials for Web Apps
TechWell
ย 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
Virtue Security
ย 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
ย 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
ย 

Viewers also liked (20)

Persatuan islam
Persatuan islamPersatuan islam
Persatuan islam
Ilham Muttaqien
ย 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
ย 
JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON)JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON)
BOSS Webtech
ย 
Tari 2
Tari 2Tari 2
Tari 2
Lusi Padma
ย 
Archaebacteria dan eubacteria
Archaebacteria dan eubacteriaArchaebacteria dan eubacteria
Archaebacteria dan eubacteria
Lusi Padma
ย 
ALMOUNKEZ Diwani , Manage your documents with ease
ALMOUNKEZ Diwani , Manage your documents with easeALMOUNKEZ Diwani , Manage your documents with ease
ALMOUNKEZ Diwani , Manage your documents with ease
Kamal Al Mounajed
ย 
Ikatan phi
Ikatan phiIkatan phi
Ikatan phi
Lusi Padma
ย 
Innovative systems icdl lesson 01 arabic
Innovative systems icdl lesson 01 arabicInnovative systems icdl lesson 01 arabic
Innovative systems icdl lesson 01 arabic
Kamal Al Mounajed
ย 
Innosys2105
Innosys2105Innosys2105
Innosys2105
Kamal Al Mounajed
ย 
Innovative systems icdl lesson 02 arabic
Innovative systems icdl lesson 02 arabicInnovative systems icdl lesson 02 arabic
Innovative systems icdl lesson 02 arabic
Kamal Al Mounajed
ย 
arabic icdl unit 1
arabic icdl unit 1arabic icdl unit 1
arabic icdl unit 1
Kamal Al Mounajed
ย 
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
Kamal Al Mounajed
ย 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
ย 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
BOSS Webtech
ย 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino21
ย 
XML Document Object Model (DOM)
XML Document Object Model (DOM)XML Document Object Model (DOM)
XML Document Object Model (DOM)
BOSS Webtech
ย 
Persatuan islam
Persatuan islamPersatuan islam
Persatuan islam
Ilham Muttaqien
ย 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
ย 
JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON)JavaScript Object Notation (JSON)
JavaScript Object Notation (JSON)
BOSS Webtech
ย 
Tari 2
Tari 2Tari 2
Tari 2
Lusi Padma
ย 
Archaebacteria dan eubacteria
Archaebacteria dan eubacteriaArchaebacteria dan eubacteria
Archaebacteria dan eubacteria
Lusi Padma
ย 
ALMOUNKEZ Diwani , Manage your documents with ease
ALMOUNKEZ Diwani , Manage your documents with easeALMOUNKEZ Diwani , Manage your documents with ease
ALMOUNKEZ Diwani , Manage your documents with ease
Kamal Al Mounajed
ย 
Ikatan phi
Ikatan phiIkatan phi
Ikatan phi
Lusi Padma
ย 
Innovative systems icdl lesson 01 arabic
Innovative systems icdl lesson 01 arabicInnovative systems icdl lesson 01 arabic
Innovative systems icdl lesson 01 arabic
Kamal Al Mounajed
ย 
Innovative systems icdl lesson 02 arabic
Innovative systems icdl lesson 02 arabicInnovative systems icdl lesson 02 arabic
Innovative systems icdl lesson 02 arabic
Kamal Al Mounajed
ย 
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
ู†ุธุงู… ุงู„ู…ู†ู‚ุฐ ู„ุชู‚ูŠูŠู… ุงู„ู…ูˆุธููŠู† ู…ู† ุงู†ุชุงุฌ ุดุฑูƒุฉ ุงู„ุงู†ุธู…ุฉ ุงู„ู…ุชุฌุฏุฏุฉ
Kamal Al Mounajed
ย 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
Arah Louise
ย 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
BOSS Webtech
ย 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
JessamenTino21
ย 
XML Document Object Model (DOM)
XML Document Object Model (DOM)XML Document Object Model (DOM)
XML Document Object Model (DOM)
BOSS Webtech
ย 
Ad

Similar to Security Testing (20)

Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ShivamSharma909
ย 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
Rajakrishnan S, MCA,MBA,MA Phil,PMP,CSM,ISTQB-Test Mgr,ITIL
ย 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
Digital Auxilio Technologies
ย 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
ย 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
Sitamarhi Institute of Technology
ย 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
Sitamarhi Institute of Technology
ย 
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
Rajkumars275092
ย 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
ย 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
ย 
AW-Infs201101067.pptx
AW-Infs201101067.pptxAW-Infs201101067.pptx
AW-Infs201101067.pptx
AnonymousDevil2
ย 
Top Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdfTop Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdf
infosec train
ย 
Top Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdfTop Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdf
infosecTrain
ย 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
ย 
C01461422
C01461422C01461422
C01461422
IOSR Journals
ย 
Security Testing
Security TestingSecurity Testing
Security Testing
ISsoft
ย 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
AmeliaJonas2
ย 
Best Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdfBest Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdf
siteseo
ย 
Top Cybersecurity Interview Questions.pdf
Top Cybersecurity Interview Questions.pdfTop Cybersecurity Interview Questions.pdf
Top Cybersecurity Interview Questions.pdf
infosec train
ย 
Master Your next Cyber security Interview Questions.pdf
Master Your next Cyber security Interview Questions.pdfMaster Your next Cyber security Interview Questions.pdf
Master Your next Cyber security Interview Questions.pdf
InfosecTrain
ย 
InfosecTrain Top Cybersecurity Interview Questions
InfosecTrain Top Cybersecurity Interview QuestionsInfosecTrain Top Cybersecurity Interview Questions
InfosecTrain Top Cybersecurity Interview Questions
priyanshamadhwal2
ย 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
ShivamSharma909
ย 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
Digital Auxilio Technologies
ย 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
Infosectrain3
ย 
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
21CSB02T UNIT 1 NOTES. FOR WEB APPLICATION SECURITY VERTICAL COURSES
Rajkumars275092
ย 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
AmeliaJonas2
ย 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
Alisha Henderson
ย 
AW-Infs201101067.pptx
AW-Infs201101067.pptxAW-Infs201101067.pptx
AW-Infs201101067.pptx
AnonymousDevil2
ย 
Top Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdfTop Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdf
infosec train
ย 
Top Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdfTop Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdf
infosecTrain
ย 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
ย 
Security Testing
Security TestingSecurity Testing
Security Testing
ISsoft
ย 
Exploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdfExploring the Seven Key Attributes of Security Testing.pdf
Exploring the Seven Key Attributes of Security Testing.pdf
AmeliaJonas2
ย 
Best Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdfBest Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdf
siteseo
ย 
Top Cybersecurity Interview Questions.pdf
Top Cybersecurity Interview Questions.pdfTop Cybersecurity Interview Questions.pdf
Top Cybersecurity Interview Questions.pdf
infosec train
ย 
Master Your next Cyber security Interview Questions.pdf
Master Your next Cyber security Interview Questions.pdfMaster Your next Cyber security Interview Questions.pdf
Master Your next Cyber security Interview Questions.pdf
InfosecTrain
ย 
InfosecTrain Top Cybersecurity Interview Questions
InfosecTrain Top Cybersecurity Interview QuestionsInfosecTrain Top Cybersecurity Interview Questions
InfosecTrain Top Cybersecurity Interview Questions
priyanshamadhwal2
ย 
Ad

Recently uploaded (20)

Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
ย 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
ย 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
ย 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
HCL Nomad Web โ€“ Best Practices and Managing Multiuser Environments
panagenda
ย 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
ย 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
ย 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 

Security Testing

  • 1. S ECURITY T ESTING FOR W EB AND M OBILE D EVELOPMENT Prepared by: Jyothi Venugopalan (QA Team Member) BOSS Webtech Private Limited www.bosswebtech.com
  • 2. S ECURITY T ESTING ๏‚ฅ The security testing is performed to check whether there is any information leakage in the sense by encrypting the application. ๏‚ฅ Security testing is a process to determine that an information system protects data and maintains functionality as intended.
  • 3. S ECURITY T ESTING ๏‚ฅ The six basic security concepts: ๏‚ค Authentication - It allows a receiver to have confidence that information it receives originated from a specific known source. ๏‚ค Authorization - Determining that a requester is allowed to receive a service or perform an operation. ๏‚ค Confidentiality - A security measure which protects the disclosure of data or information to parties other than the intended. ๏‚ค Integrity โ€“ Whether the intended receiver receives the information or data which is not altered in transmission. ๏‚ค Non-repudiation - Interchange of authentication information with some form of provable time stamp e.g. with session id etc. ๏‚ค Availability - Assuring information and communications services will be ready for use when expected.
  • 4. N EED OF S ECURITY T ESTING ๏‚ฅ Security test helps in finding out loopholes that can cause loss of important information and allow any intruder enter into the systems. ๏‚ฅ Security Testing helps in improving the current system. ๏‚ฅ Ensures that the system will work for longer time. ๏‚ฅ Ensures that people in your organization understand and obey security policies.
  • 5. D IFFERENT T YPES OF S ECURITY T ESTING ๏‚ฅ Security Auditing: Security Auditing includes direct inspection of the application developed and Operating Systems. This also involves code walk-through. ๏‚ฅ Security Scanning: It is all about scanning and verification of the system and applications. ๏‚ฅ Vulnerability Scanning: Vulnerability scanning involves scanning of the application for all known vulnerabilities. ๏‚ฅ Risk Assessment: Risk assessment is a method of analyzing and deciding the risk that depends upon the type of loss and the possibility of loss occurrence. ๏‚ฅ Penetration Testing: In this type of testing, a tester tries to forcibly access and enter the application under test. ๏‚ฅ Ethical Hacking: Itโ€™s a forced intrusion of an external element into the system & applications that are under Security Testing.
  • 6. S ECURITY T HREATS FOR W EBSITE ๏‚ฅ SQL Injection - Insertion of the SQL query into the web application which can directly interact with the backend database on server to reveal information stored in it. ๏‚ฅ Cross Site Scripting- Insertion of the scripting code into client browser. So when client send data to server database, scripting code on client side get stored into the server database.
  • 7. S ECURITY T HREATS FOR W EBSITE
  • 8. S ECURITY T ESTING A PPROACH FOR W EBSITE ๏‚ฅ Password cracking: In order to log in to the private areas of the application, one can either guess a username/ password or use some password cracker tool for the same. ๏‚ฅ URL manipulation through HTTP GET methods: The tester should check if the application passes important information in the querystring. ๏‚ฅ SQL Injection: Entering a single quote (โ€˜) in any textbox should be rejected by the application. ๏‚ฅ Cross Site Scripting (XSS): Any HTML e.g. <HTML> or any script e.g. <SCRIPT> should not be accepted by the application.
  • 9. S ECURITY T HREATS FOR M OBILE A PPLICATION ๏‚ฅ Mobile malware and viruses: A mobile virus is an electronic virus that targets mobile phones or wireless- enabled PDAs. ๏‚ฅ Eavesdropping: Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message etc. ๏‚ฅ Unauthorized access: careful attention needs to be paid to AAA โ€“ authentication, authorization, and accounting. ๏‚ฅ Physical security: While many notebook computers are indeed lost or stolen every year, it's a lot easier to simply misplace a mobile device.
  • 10. S ECURITY T ESTING A PPROACH FOR M OBILE A PPLICATION ๏‚ฅ Authentication checks ๏‚ฅ Input Validation checks ๏‚ฅ Session Management checks ๏‚ฅ Encryption checks ๏‚ฅ Application checks ๏‚ฅ SQL injection checks ๏‚ฅ LDAP injection checks ๏‚ฅ XPATH injection checks
  • 11. S ECURITY T ESTING TOOLS ๏‚ฅ Netsparker Community Edition ๏‚ฅ Websecurify ๏‚ฅ Wapiti ๏‚ฅ N-Stalker ๏‚ฅ skipfish ๏‚ฅ Scrawler ๏‚ฅ Watcher ๏‚ฅ x5s ๏‚ฅ Exploit-Me ๏‚ฅ WebScarab
  • 12. S UMMARY ๏‚ฅ No Website is 100% Secure. Prevention is the better way to secure the website. ๏‚ฅ Security Vulnerability arise on different ways which up on risks. ๏‚ฅ The Critical risk is attacking the website and stealing the data.
  • 14. A BOUT BOSS W EBTECH ๏‚ฅ BOSS Webtech is a process oriented design house specializing in web design, web development, backend web programming, mobile application development and other web and mobile related design and support services. ๏‚ฅ Recently launched BizPlus โ€“ Mobile based survey software. Check it more here http://bizplusonline.com/ ๏‚ฅ More products here http://www.bosswebtech.com/products/products.html CONTACT BOSS WEBTECH ๏‚ฅ Call 831-998-9121 at US EST/CST/MST/PST Zone or email [email protected]