Preview

Web Application Security

Satisfactory Essays
Open Document
Open Document
341 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Application Security
Web Application Security

OWASP Top 10 - 2007

OWASP Top 10 - 2010

Need to Know for IT Manager about:
What is Web Application Security?
 How to ensure application security?
 What is application security audit?


Web Application Security
What is web application security audit?
 Why audit is required?
 How audit is different than testing
 How audit is performed
 Auditing standards


Web Penetration Testing Steps


Passive Mode






Gathering information
Tools used

Active Mode
Domains covered











Configuration Management Testing
Business Logic Testing
Authentication Testing
Authorization Testing
Session Management Testing
Data Validation Testing
Denial of Service Testing
Web Service Testing
Ajax Testing

Tools and Methodology used

Penetration Test – Information Gathering


Collecting information about target application and target environment
 Identifying


Parameters, Form values, Cookies and Headers

 Web


application entry points

application fingerprint

Application stacks, versions used

 Application


discovery

Different applications, access mechanisms (olds and obsoletes)

 Analysis

of the error codes

Configuration Management Testing
SSL Testing
 Infrastructure Configuration Management
Testing
 Application Configuration Management
Testing
 Testing for file extensions
 Testing for HTTP methods


Authentication Testing








Credentials transport over encrypted channels
Testing for user enumeration
Brute Force Attack
Testing for bypassing authentication scheme
Testing for logout and browser cache management Testing for CAPTCHA
Testing for vulnerable remember password and password reset

Session Management Testing
 Testing

for session management

schema
 Testing for cookies attributes
 Testing for exposed session variables

Authorization Testing
Testing for path

You May Also Find These Documents Helpful

  • Good Essays

    The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions…

    • 775 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    7. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Secure Communities

    • 863 Words
    • 4 Pages

    has a criminal history. With S-Comm it doesn 't stop there. The prints are also transmitted to an…

    • 863 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Role Based Access Control

    • 598 Words
    • 3 Pages

    Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise. It restricts the system access to authorized users only. It was developed to overcome the complexities of managing individual user permissions and their assignments. Security administration of large systems is complex, but it can be simplified by a role-based access control approach. A family of increasingly complex models shows how RBAC works.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Server Security Policy

    • 708 Words
    • 3 Pages

    1.0 Purpose The purpose of this policy is to establish standards for the base configuration of internal server equipment that is owned and/or operated by . Effective implementation of this policy will minimize unauthorized access to proprietary information and technology. 2.0 Scope This policy applies to server equipment owned and/or operated by , and to servers registered under any -owned internal network domain. This policy is specifically for equipment on the internal network. For secure configuration of equipment external to on the DMZ, refer to the Internet DMZ Equipment Policy. 3.0 Policy 3.1 Ownership and Responsibilities All internal servers deployed at must be owned by an operational group that is responsible for system administration. Approved server configuration guides must be established and maintained by each operational group, based on business needs and approved by InfoSec. Operational groups should monitor configuration compliance and implement an exception policy tailored to their environment. Each operational group must establish a process for changing the configuration guides, which includes review and approval by InfoSec. • Servers must be registered within the corporate enterprise management system. At a minimum, the following information is required to positively identify the point of contact: o Server contact(s) and location, and a backup contact o Hardware and Operating System/Version o Main functions and applications, if applicable Information in the corporate enterprise management system must be kept up-to-date. Configuration changes for production servers must follow the appropriate change management procedures.…

    • 708 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Security Control Tutorial

    • 468 Words
    • 2 Pages

    A threat is a potential to do harm. A vulnerability is a means by a threat agent can cause harm. A control is a protective measure that prevents a threat agent from exercising a vulnerability.…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Masking

    • 4525 Words
    • 19 Pages

    increases, more and more data gets shared, thus further increasing the risk of a data breach,…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Cross Site Scripting

    • 923 Words
    • 4 Pages

    A web application is an application software that is hosted on web and runs on a web browser. Web application security is a branch of information security that deals specifically with security of websites, web applications and web services.…

    • 923 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Software Security

    • 996 Words
    • 4 Pages

    Due date: Midnight Sunday (week 12), i.e., 23:59 sharp, 27 May 2012. The assignment is submitted via Weblearn. Report must be submitted in HTML or PDF format. Programming languages HTML, JavaScript and PHP are preferred. Each submission must include the file readme.txt in the following format: StudentID: [your Student ID - without the initial "S"] Login: [your CS username] Name: [your full name] Partner Name: [your team member’s name] Partner ID: [your team member’s Student ID] Topic: [your report topic] Notes: [any other relevant information]…

    • 996 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Data Security

    • 1962 Words
    • 8 Pages

    Computers and Networking have become inseparable by now. A number of confidential transactions occur every second and today computers are used mostly for transmission rather than processing of data. So Network Security is needed to prevent hacking of data and to provide authenticated data transfer. Network Security can be achieved by Firewall. Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. Restricting the network topology, difficulty in filtering of certain protocols, End-to-End encryption problems and few more problems lead to the evolution of Distributed Firewalls.…

    • 1962 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Srs of Web Application

    • 6071 Words
    • 25 Pages

    References: IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specifications. IEEE Computer Society, 1998.…

    • 6071 Words
    • 25 Pages
    Powerful Essays

Related Topics