Explanation of Security Test report

Source: Internet
Author: User

The specific work scenario is described in the previous blog. I will not go into details here. I wrote this article because I remembered that the test report was informative and it is worth learning about some technical content of the report, writing this blog is a learning process.

This report was generated by the appscan8.6 scan and mainly divided into the following types:

Revision suggestions
N review possible solutions for hazardous character Injection
N always uses the SSL and post parameters when sending sensitive information.
N remove sensitive information from HTML comments
N remove email addresses from the Web site
N remove the internal IP address from the Web site
N remove the test script from the server
N remove the business logic and security logic from the client
N. Set the "AutoComplete" attribute to "off" correctly"
N download security patches for Web servers or applications
N add the "HTTPOnly" attribute to all session cookies
N verify that the parameter value is within its expected range and type. Do not output debugging error messages or exceptions
Consultation
N SQL blind Injection
N SQL Injection
N Cross-Site Scripting
N Authentication Bypass Using SQL Injection
N decrypted login requests
N link injection (facilitating cross-site Request Forgery)
N phishing through the framework
N Database Error modes discovered
N The HTTPOnly attribute is missing from the session cookie.
N automatically fill in HTML attributes that are not disabled for the password field
N html annotation Sensitive Information Leakage
N discovery email address mode
N discover possible server path leakage Modes
N internal IP address leakage Mode
N detected application test script
N client (JavaScript) Cookie reference
N application errors

Wait a few days. These two days are too difficult to handle, and your eyes hurt.

There are too many introductions in the appendix after the appscan Test Report, which is too hard to write. The application also has a white box Java code analysis report. The main problems are as follows:

Cross-site Scripting involving the backend
Read/write competition caused by single-instance Member Fields
Poor password management channel operations
Code correction: calls the equals method to a null object
Insecure Random Number
Httpresponse (splitting)
Bad J2EE practice: Save non-serializable objects in the session
Local file path operation

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.