Thursday, December 11, 2008

Security Testing of Web Applications

Security testing is a approach to find out the loopholes of application and our confidential data stays confidential and users can perform only those tasks that they are authorized to perform, a user should not be able to deny the functionality of the web site and cant not authorize to access other users data.
Vulnerability his is a weakness in the web application. The cause of such a “weakness” can be bugs in the application, an injection or the presence of viruses.
I m trying make a straight forward approach, so you can easliy get which corner need more attention during security testing.

1.URL modification-This happens when the application uses the HTTP GET method to pass information between the client and the server. The information is passed in parameters in the querystring. The tester can modify a parameter value in the querystring to check if the server accepts it.Via HTTP GET request user information is passed to server for authentication or fetching data. Attacker can manipulate every input variable passed from this GET request to server in order to get the required information or to corrupt the data. In such conditions any unusual behavior by application or web server is the doorway for the attacker to get into the application
2.SQL injection- is a technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is in fact an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.
3.Cross-site scripting (XSS)-is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits.
4.Cookie and Session Manipulation-A cookie is a small piece of information usually created by the Web server and stored in the Web browser. Each time the user contacts the Web server, this data is passed back to the server. The cookie contains information used by Web applications to persist and pass variables back and forth between the browser and the Web application.If username or password is stored in cookies without encrypting, attacker can use different methods to steal the cookies and then information stored in the cookies like username and password.

No comments:

Post a Comment