SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Web Application Penetration Test

Why (background)?

Web applications have become increasingly vulnerable to different
forms of hacker attacks. According to a Gartner Report, 75% of
attacks today occur at the application level. A Forrester survey states
that “people are now attacking through applications, because it’s
easier than through the network layer.”

Despite common use of defenses such as firewalls and intrusion
detection or prevention systems, hackers can access valuable
proprietary and customer data, shutdown websites and servers and
defraud businesses, as well as introduce serious legal liability without
being stopped or, in many cases, even detected.

To counter this problem, Cyber 51 Ltd. offers a comprehensive
security risk assessment solution - Web Application Penetration Testing
- to identify, analyze and report vulnerabilities in a given application.
As part of this service, Cyber 51 Ltd. attempts to identify both inherent
and potential security risks that might work as entry points for the
hacker. We believe vulnerabilities could be present in a web
application due to inadvertent flaws left behind during development,
security issues in the underlying environment and misconfigurations in
one or more components like database, web server etc.

When conducting a Web Application Penetration Testing assignment,
Cyber 51 Ltd. adopts a strong technology and process-based approach
supported by a well-documented methodology to identify potential
security flaws in the application and underlying environment.
Adherence to industry standards such as OWASP, customized tests
based on technology and business logic, skilled and certified security
engineers, risk assessment on the vulnerabilities found, scoring
system based on CVSS (Common Vulnerability Scoring System) make
us different from the other vendors in this space.

Customers would benefit from web application penetration testing on
the application as it gives an in-depth analysis of your current security
posture, recommendations for reducing exposure to currently
identified vulnerabilities are highlighted and it allows the customer to
make more informed decisions, enabling management of the


            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
company’s exposure to threats. The security assessment report
submitted on completion of the engagement provides a detailed and
prioritized mitigation plan to help customers in addressing security
issues in a phased manner.

How (Our Methodology)?

Configuration Management Analysis:

The infrastructure used by the Web application will be evaluated from
a security perspective.

The tests to be performed are as follows:

     • TLS and SSL tests.

     • Security Testing over the listener of management system
     databases.

     • Testing the configuration of the infrastructure and its
     relationship with the Web application, vulnerability analysis,
     analysis of authentication mechanisms and identification of all
     the ports used by the Web application.

     • Testing the application settings, search through directories and
     regular files, comments from developers and the eventual
     acquisition and operational analysis of logs generated by the
     application.

     • Searching for old files, backups, logs of operations and other
     files used by the Web application.

     • Search and test management interfaces or web application
     related infrastructure.

     • Test various HTTP methods supported and the possibilities of
     XST (Cross-Site Tracing).




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
Analysis of Authentication:

We will evaluate the various mechanisms and aspects of the web
application authentication.

The tests to be performed are as follows:

     • Credentials management

     • Enumeration of users and user accounts easily identifiable.

     • Proof of identification credentials brute force, based on
     information found or inferred.

     • Testing the authentication mechanisms looking for evasion

     • Logouts mechanisms and weaknesses associated with the
     Internet browser cache.

     • Strength tests over captchas and test multi-factor
     authentication.



Session Management Analysis:

We will evaluate the different mechanisms and management aspects
of web application sessions.

The tests to be performed are as follows:

     • Session management scheme will be tested.

     • CSRF (Cross-Site Request Forgery).

     • Test attributes Cookies.

     • Setting sessions.

     • Evidence of attributes exposed session and repetition.




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
Analysis of Authorization:

We will evaluate the various mechanisms and aspects of web
application authorization.

The tests to be performed are as follows:

     • Privilege escalation.

     • "Path Traversal".

     • Evidence of evasion of clearance mechanisms.

     • Testing the "business logic" of the Web application, avoiding,
     altering, or cheating their relationships within the application.



Data Validation Analysis:

We will evaluate the various repositories, access and protection
mechanisms related to the validation of data used by the Web
application.

The tests to be performed are as follows:

     • Test various XSS (Cross Site Scripting) and "Cross Site
     Flashing."

     • SQL Injection tests.

     • LDAP injection tests.

     • Evidence of ORM injection.

     • XML Injection tests.

     • SSI injection testing.

     • Testing XPath Injection.

     • Injection Test IMAP / SMTP.



            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
• Evidence Code Injection.

     • Injection Test Operating System Commands.

     • Evidence of buffer overflow.

     • Evidence of Splitting / Smuggling of HTTP.

     • Evidence of evasion of clearance mechanisms.

     • Evidence of privilege escalation.



Analysis of Web Services:

We will evaluate the web application services related to SOA (Service
Oriented Architecture):

The tests to be performed are as follows:

     • Security testing of WSDL.

     • Evidence of structural Security of XML.

     • Testing of security at XML content.

     • Test HTTP GET parameters / REST.

     • Tests with contaminated SOAP attachments.

     • Repeat testing of web services.

     • Testing AJAX Web application vulnerabilities regarding this
     technology.




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk

Más contenido relacionado

La actualidad más candente

Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security TestingAlan Kan
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing ToolsEric Lai
 
Security Operations
Security OperationsSecurity Operations
Security Operationsankitmehta21
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTshiriskumar
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3vhimsikal
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...Inspirisys Solutions Limited
 
Security Testing
Security TestingSecurity Testing
Security TestingKiran Kumar
 
Web 2.0 Hacking
Web 2.0 HackingWeb 2.0 Hacking
Web 2.0 Hackingblake101
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The HorizonLalit Kale
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101Jannis Kirschner
 
Building a secure BFF at Postman
Building a secure BFF at PostmanBuilding a secure BFF at Postman
Building a secure BFF at PostmanAnkit Muchhala
 
Fundamental Aspects of Security Testing
Fundamental Aspects of Security TestingFundamental Aspects of Security Testing
Fundamental Aspects of Security Testingbquriousindia
 

La actualidad más candente (20)

Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Step by step guide for web application security testing
Step by step guide for web application security testingStep by step guide for web application security testing
Step by step guide for web application security testing
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing Tools
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
 
Security testing
Security testingSecurity testing
Security testing
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Web 2.0 Hacking
Web 2.0 HackingWeb 2.0 Hacking
Web 2.0 Hacking
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Building a secure BFF at Postman
Building a secure BFF at PostmanBuilding a secure BFF at Postman
Building a secure BFF at Postman
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Fundamental Aspects of Security Testing
Fundamental Aspects of Security TestingFundamental Aspects of Security Testing
Fundamental Aspects of Security Testing
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 

Destacado

я і ураїна. тварини
я і ураїна. твариния і ураїна. тварини
я і ураїна. твариниNatali Rafalska
 
Presentazione aquarius
Presentazione aquariusPresentazione aquarius
Presentazione aquariusMarco Gallo
 
Sd pertemuan 1 & 2
Sd   pertemuan 1 & 2Sd   pertemuan 1 & 2
Sd pertemuan 1 & 2biedoen
 
Виртуальная сфера - Безопасность - Хакеры и Терроризм
Виртуальная сфера - Безопасность -  Хакеры и ТерроризмВиртуальная сфера - Безопасность -  Хакеры и Терроризм
Виртуальная сфера - Безопасность - Хакеры и ТерроризмSL.GH VIPNET T.C
 
Dan Bannino
Dan BanninoDan Bannino
Dan BanninoAOtaki
 
One Library Per Village
One Library Per Village One Library Per Village
One Library Per Village Sujai.G Pillai
 
AA Section 8-5
AA Section 8-5AA Section 8-5
AA Section 8-5Jimbo Lamb
 
Thong bao thi tuyen chuc danh 2015
Thong bao thi tuyen chuc danh 2015Thong bao thi tuyen chuc danh 2015
Thong bao thi tuyen chuc danh 2015tuyencongchuc
 
Translation #9 cello poem no.3 (chinese and malay)
Translation #9 cello poem no.3 (chinese and malay)Translation #9 cello poem no.3 (chinese and malay)
Translation #9 cello poem no.3 (chinese and malay)Isaac Low
 
Nesteggs 401 K Savings Plan 2009
Nesteggs 401 K Savings Plan 2009Nesteggs 401 K Savings Plan 2009
Nesteggs 401 K Savings Plan 2009bfine
 

Destacado (17)

я і ураїна. тварини
я і ураїна. твариния і ураїна. тварини
я і ураїна. тварини
 
Resume2017
Resume2017Resume2017
Resume2017
 
осінь
осіньосінь
осінь
 
Presentazione aquarius
Presentazione aquariusPresentazione aquarius
Presentazione aquarius
 
Sd pertemuan 1 & 2
Sd   pertemuan 1 & 2Sd   pertemuan 1 & 2
Sd pertemuan 1 & 2
 
група 6
група 6група 6
група 6
 
Upvc fascia
Upvc fasciaUpvc fascia
Upvc fascia
 
Виртуальная сфера - Безопасность - Хакеры и Терроризм
Виртуальная сфера - Безопасность -  Хакеры и ТерроризмВиртуальная сфера - Безопасность -  Хакеры и Терроризм
Виртуальная сфера - Безопасность - Хакеры и Терроризм
 
Dan Bannino
Dan BanninoDan Bannino
Dan Bannino
 
One Library Per Village
One Library Per Village One Library Per Village
One Library Per Village
 
AA Section 8-5
AA Section 8-5AA Section 8-5
AA Section 8-5
 
Thong bao thi tuyen chuc danh 2015
Thong bao thi tuyen chuc danh 2015Thong bao thi tuyen chuc danh 2015
Thong bao thi tuyen chuc danh 2015
 
Primary vlan
Primary vlanPrimary vlan
Primary vlan
 
Siklus asam sitrat
Siklus asam sitratSiklus asam sitrat
Siklus asam sitrat
 
Translation #9 cello poem no.3 (chinese and malay)
Translation #9 cello poem no.3 (chinese and malay)Translation #9 cello poem no.3 (chinese and malay)
Translation #9 cello poem no.3 (chinese and malay)
 
Nesteggs 401 K Savings Plan 2009
Nesteggs 401 K Savings Plan 2009Nesteggs 401 K Savings Plan 2009
Nesteggs 401 K Savings Plan 2009
 
Transformar imágenes power point
Transformar imágenes power pointTransformar imágenes power point
Transformar imágenes power point
 

Similar a Web Application Penetration Test

How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alAlert Logic
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsAlert Logic
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsAlert Logic
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Richard Sullivan
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityLarry Ball
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problemskiansahafi
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slidesBassam Al-Khatib
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfAmeliaJonas2
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Security Testing
Security TestingSecurity Testing
Security TestingISsoft
 
Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer
 

Similar a Web Application Penetration Test (20)

How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
EISA Considerations for Web Application Security
EISA Considerations for Web Application SecurityEISA Considerations for Web Application Security
EISA Considerations for Web Application Security
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Using Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security ProblemsUsing Analyzers to Resolve Security Problems
Using Analyzers to Resolve Security Problems
 
Web applications security conference slides
Web applications security  conference slidesWeb applications security  conference slides
Web applications security conference slides
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
 
Ownux global Aug 2023.pdf
Ownux global Aug 2023.pdfOwnux global Aug 2023.pdf
Ownux global Aug 2023.pdf
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Security testing
Security testingSecurity testing
Security testing
 
Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdf
 

Más de martinvoelk

Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Publicmartinvoelk
 
Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyermartinvoelk
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51martinvoelk
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51martinvoelk
 
Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51martinvoelk
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offersmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consultingmartinvoelk
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outlinemartinvoelk
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Coursesmartinvoelk
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Coursesmartinvoelk
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redesmartinvoelk
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Servicesmartinvoelk
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associatemartinvoelk
 

Más de martinvoelk (16)

Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Public
 
Consulting Flyer
Consulting FlyerConsulting Flyer
Consulting Flyer
 
Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51Penetration Testing Services Technical Description Cyber51
Penetration Testing Services Technical Description Cyber51
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51Vulnerability Assesment Subscriptions Cyber51
Vulnerability Assesment Subscriptions Cyber51
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Ppctrainer Offers
Ppctrainer OffersPpctrainer Offers
Ppctrainer Offers
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
AdWords Training & AdWords Consulting
AdWords Training & AdWords ConsultingAdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
 
Basic Adwords Course Outline
Basic Adwords Course OutlineBasic Adwords Course Outline
Basic Adwords Course Outline
 
Pronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training CoursesPronetexpert Cisco Ccde Bootcamp Training Courses
Pronetexpert Cisco Ccde Bootcamp Training Courses
 
CCIE Bootcamp Training Courses
CCIE Bootcamp Training CoursesCCIE Bootcamp Training Courses
CCIE Bootcamp Training Courses
 
Servicios de la Seguridad delos Redes
Servicios de la Seguridad delos RedesServicios de la Seguridad delos Redes
Servicios de la Seguridad delos Redes
 
IT Network Security Services
IT Network Security ServicesIT Network Security Services
IT Network Security Services
 
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner AssociateProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
 

Web Application Penetration Test

  • 1. Web Application Penetration Test Why (background)? Web applications have become increasingly vulnerable to different forms of hacker attacks. According to a Gartner Report, 75% of attacks today occur at the application level. A Forrester survey states that “people are now attacking through applications, because it’s easier than through the network layer.” Despite common use of defenses such as firewalls and intrusion detection or prevention systems, hackers can access valuable proprietary and customer data, shutdown websites and servers and defraud businesses, as well as introduce serious legal liability without being stopped or, in many cases, even detected. To counter this problem, Cyber 51 Ltd. offers a comprehensive security risk assessment solution - Web Application Penetration Testing - to identify, analyze and report vulnerabilities in a given application. As part of this service, Cyber 51 Ltd. attempts to identify both inherent and potential security risks that might work as entry points for the hacker. We believe vulnerabilities could be present in a web application due to inadvertent flaws left behind during development, security issues in the underlying environment and misconfigurations in one or more components like database, web server etc. When conducting a Web Application Penetration Testing assignment, Cyber 51 Ltd. adopts a strong technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the application and underlying environment. Adherence to industry standards such as OWASP, customized tests based on technology and business logic, skilled and certified security engineers, risk assessment on the vulnerabilities found, scoring system based on CVSS (Common Vulnerability Scoring System) make us different from the other vendors in this space. Customers would benefit from web application penetration testing on the application as it gives an in-depth analysis of your current security posture, recommendations for reducing exposure to currently identified vulnerabilities are highlighted and it allows the customer to make more informed decisions, enabling management of the Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 2. company’s exposure to threats. The security assessment report submitted on completion of the engagement provides a detailed and prioritized mitigation plan to help customers in addressing security issues in a phased manner. How (Our Methodology)? Configuration Management Analysis: The infrastructure used by the Web application will be evaluated from a security perspective. The tests to be performed are as follows: • TLS and SSL tests. • Security Testing over the listener of management system databases. • Testing the configuration of the infrastructure and its relationship with the Web application, vulnerability analysis, analysis of authentication mechanisms and identification of all the ports used by the Web application. • Testing the application settings, search through directories and regular files, comments from developers and the eventual acquisition and operational analysis of logs generated by the application. • Searching for old files, backups, logs of operations and other files used by the Web application. • Search and test management interfaces or web application related infrastructure. • Test various HTTP methods supported and the possibilities of XST (Cross-Site Tracing). Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 3. Analysis of Authentication: We will evaluate the various mechanisms and aspects of the web application authentication. The tests to be performed are as follows: • Credentials management • Enumeration of users and user accounts easily identifiable. • Proof of identification credentials brute force, based on information found or inferred. • Testing the authentication mechanisms looking for evasion • Logouts mechanisms and weaknesses associated with the Internet browser cache. • Strength tests over captchas and test multi-factor authentication. Session Management Analysis: We will evaluate the different mechanisms and management aspects of web application sessions. The tests to be performed are as follows: • Session management scheme will be tested. • CSRF (Cross-Site Request Forgery). • Test attributes Cookies. • Setting sessions. • Evidence of attributes exposed session and repetition. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 4. Analysis of Authorization: We will evaluate the various mechanisms and aspects of web application authorization. The tests to be performed are as follows: • Privilege escalation. • "Path Traversal". • Evidence of evasion of clearance mechanisms. • Testing the "business logic" of the Web application, avoiding, altering, or cheating their relationships within the application. Data Validation Analysis: We will evaluate the various repositories, access and protection mechanisms related to the validation of data used by the Web application. The tests to be performed are as follows: • Test various XSS (Cross Site Scripting) and "Cross Site Flashing." • SQL Injection tests. • LDAP injection tests. • Evidence of ORM injection. • XML Injection tests. • SSI injection testing. • Testing XPath Injection. • Injection Test IMAP / SMTP. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 5. • Evidence Code Injection. • Injection Test Operating System Commands. • Evidence of buffer overflow. • Evidence of Splitting / Smuggling of HTTP. • Evidence of evasion of clearance mechanisms. • Evidence of privilege escalation. Analysis of Web Services: We will evaluate the web application services related to SOA (Service Oriented Architecture): The tests to be performed are as follows: • Security testing of WSDL. • Evidence of structural Security of XML. • Testing of security at XML content. • Test HTTP GET parameters / REST. • Tests with contaminated SOAP attachments. • Repeat testing of web services. • Testing AJAX Web application vulnerabilities regarding this technology. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk