Security Testing
CloudLabs
Projects
Assignment
24x7 Support
Lifetime Access
.
Course Overview
Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. Due to the logical limitations of security testing, passing security testing is not an indication that no flaws exist or that the system adequately satisfies the security requirements.Typical security requirements may include specific elements of confidentiality, integrity, authentication, availability, authorization and non-repudiation. Actual security requirements tested depend on the security requirements implemented by the system. Security testing as a term has a number of different meanings and can be completed in a number of different ways. As such a Security Taxonomy helps us to understand these different approaches and meanings by providing a base level to work from.
At the end of the training, participants will be able to:
Pre-requisite
Familiarity with Web applications and software testing Familiarity with HTML, JavaScript, and SQL is helpful, but not required
Duarion
5 days
Course Outline
- Brief history, Examples
- Need for security testing
- Work profile, Career opp
- Skill requirement
- HTTP Protocol
- Cookies
- Query parameters
- HTTPfox
- TamperFox
- Firebug
- Threat Modeling
- Finding Entry Points – Files
- Finding Entry Points – Sockets
- Finding Entry Points – HTTP
- Requests
- Finding Entry Points – Server
- Responses
- Finding Entry Points – UI
- Finding Entry Points – SQL
- Finding Entry Points – Email
- Finding Entry Points – Command
- Line
- Estimation
- Information Disclosure
- Weak Permissions
- Social Engineering
- Log Analysis
- Error / Exception Analysis
- Credential Transport
- User Enumeration
- Dictionary Accounts
- Brute Force
- Vulnerable Password recovery
- Log out
- Cache
- Path Traversal
- Bypass authrization
- Privilege Escalation
- Cookies
- Session Fixation
- Exposed Session Variables
- Example
- Potential threat
- Attack Technique
- Black box testing strategy
- XML
- LDAP
- Xpath
- IMAP
- Code
- HTML
- Example
- Types: Reflected, Persistent
- Potential threat
- Attack Technique
- Black box testing strategy
- File Based
- eb Based
- Stack
- Integer
- Heap
- Locking
- I/O
- SQL WildCard attacks
- Security Testing Reso