Monday, May 22, 2017

Web Security Testing

Security:  22May2017

Application security
End point security
Network security: Authentication
Content security

One factor authentication
Two factor authentication : Ex: ATM card & Pin

Content Security: 
Public data: Username
Private data: Password

Confidentiality: Encryption

Encryption + Decryption = Cryptography

Integrity: Hash code for checking the completeness of the data received from the sender

Security Trio:
All the below three cannot be obtained, if the application is more secure, ease of use will be difficult.

1 Security
2 Functionality
3 Ease of Use

Security Terminology:
1 Asset: 
 Tangible asset: Physical assets
 Intangible asset: Software and Licenses


2. Threat: Change to asset from intruder

3. Vulnerably: Weakness in the application

4 Attack: 

5. Exploit: Stealing the data and intruder benefit

6. Payload: Attacker write query and get data

7. Zero-Day: Attack with no solution 
                      Initially SQL injection had no solution

8. Risk


Security Control:
OWAS: Open Web App

Attack Surface:
Attack surface is the sum total of all the vulnerability’s in an application
E: User Input. Protocol, Interfaces

Elements of Security:
1. Confidentiality
2. Integrity
3. Availability:  Negative factor is Denial of Service

Authorization: Access Control
Authentication: Identification of valid user of not


Non-Repudiation:

Digital Certificate:

SHA: Secure has algorithm
MD5- Message Digest

RSA

Kinds of Attack:

Injection
  Command            Code     SQL injection

SQL injection: 
Numerical SQL Injection
String SQL Injection


Web scarab tool for editing the request and response

Blind SQL Injection

To know the database, tables and contents of the website, Kali 2016 OS with SQLMAP tool can be used.
There are several command where we can get all the details, whenever there is an error in the page.

ex: sqlmap - h     (for help)
sqlmap -u "websiteurl" -dbs      ( for getting database name)


Cross -Site Scripting:
1. Store / Persistence
2. Reflected / Temporary


Cross-Site Request Forgery: (in .Net its also called as view state one click attack)
(CSRF/XSRF)



JMeter Simple Controller

  Simple Controller is just a  container  for user request.