Web security test Two steps away

Source: Internet
Author: User
Tags file url sql error

Web security testing should also follow the principle of early testing, when performing functional testing (should perform the following test Checklist security test scenario), and then after the completion of the functional test, the performance test before the scan test, you can use the tool appscan,hp WebInspect, Scan the vulnerability scanning tool such as AWS.

The first step: compare commonly used security test checklist as follows:

1: Do not log into the system, directly enter the login page URL can be accessed.

2: Do not log into the system, directly enter the download file URL can download files.

3: After logging out, click the browser's Back button to access the previous page.

4: Manually change the parameter values in the URL to access pages that do not have permission to access. If the parameters in the URL of the normal user are l=e, the parameters in the corresponding URL of the advanced user are l=s, and the parameter E in the URL is changed to "s " to access the page without permission when the user logs on to the system.

5. All credentials should be passed through an encrypted transmission channel (e.g. during login).

6: The Security page should use the HTTPS protocol.

7: Verify SQL Injection (including digital injection and character injection, etc.).

8: Verify the XSS Cross-site scripting vulnerability, and when performing a new operation, enter in all input boxes
9. The file upload function should use the file type restriction, or EXE and other executable files, confirm whether the server side can be run directly.

10: Verify the upload vulnerability, as long as the Web application allows uploading files, there may be a file upload vulnerability. Because some programs do not format the uploaded files or simply do JS authentication on the client, the attacker can remove the client's JavaScript validation via Firebug, or pass JavaScript validation via burp suit as normal process , and then tamper with the HTTP layer in transit.

11. The error message contains SQL statements, SQL error messages, and other sensitive information about the Web server.

12: Verify the validity period of the session.

Second step: After the functional test is complete, before the performance test is started, the scanning tool is scanned with professional scanning tools to generate test reports, such as Wvs and AppScan are among the top 10 scanning tools.

Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

Web security test Two steps away

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.