security testing operation vijay

30
Security Testing Operation Vijay

Upload: lavanyam210

Post on 14-Apr-2017

122 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Security testing   operation vijay

Security TestingOperation Vijay

Page 2: Security testing   operation vijay

What is hacking?

Page 3: Security testing   operation vijay

Hackers

Page 4: Security testing   operation vijay

Types of Hackers● Ethical Hackers

● Crackers

Page 5: Security testing   operation vijay

DefineSecurity Testing is a type of testing that

intends to uncover vulnerabilities of the system and determine that its data and resources are protected from possible intruders.

Page 6: Security testing   operation vijay

Types of Security Testing● Infrastructure Security Testing

● Application Security Testing

Page 7: Security testing   operation vijay

When?

Page 8: Security testing   operation vijay

Security Testing Vocabulary● Reconnaissance/ Information

gathering

● Vulnerability

● Exploit

Page 9: Security testing   operation vijay

Reconnaissance

Demo

Page 10: Security testing   operation vijay

Reconnaissance

Mission

Page 11: Security testing   operation vijay

P@ssw04d

Page 13: Security testing   operation vijay

Default / Weak Passwords

Page 14: Security testing   operation vijay

Password Vaults

Demo

Page 15: Security testing   operation vijay

Cross Site ScriptingClient side injection attack

Types:

Reflected XSS

Stored XSS

DOM based XSS

Page 16: Security testing   operation vijay

Reflected XSS

Demo

Page 17: Security testing   operation vijay
Page 18: Security testing   operation vijay

Reflected XSS

Mission

Page 19: Security testing   operation vijay

Stored XSS

Demo

Page 20: Security testing   operation vijay
Page 21: Security testing   operation vijay

Stored XSS

Mission

Page 22: Security testing   operation vijay

XSS PreventionDon’t use user input as-is

Encoding

X-XSS-Protection Response Header

HttpOnly flag Response Header

Page 23: Security testing   operation vijay

Popular XSS Attacks

Page 24: Security testing   operation vijay

SQL InjectionAttack where SQL commands are

injected in order to affect the execution of predefined SQL commands

Page 25: Security testing   operation vijay

SQL Injection

Demo

Page 26: Security testing   operation vijay
Page 27: Security testing   operation vijay

SQL Injection PreventionDon’t use user input directly

Use prepared statements

Use stored procedures

Use frameworks

Page 28: Security testing   operation vijay

ZAP

Page 29: Security testing   operation vijay

Referenceshttps://www.owasp.org

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

https://www.google.co.in/about/appsecurity/tools/

https://xkcd.com/327/

http://www.dvwa.co.uk/

https://www.amazon.in/Web-Application-Hackers-Handbook-Exploiting-ebook/dp/B005LVQA9S

https://google-gruyere.appspot.com

https://www.youtube.com/watch?v=lc7scxvKQOohttps://www.imperva.com/docs/wp_consumer_password_worst_practices.pdf

http://softwaretestingfundamentals.com/security-testing/

Page 30: Security testing   operation vijay

Thank you

Dhaval Doshi (@dhavaldoshi)Lavanya Mohan (@LavanyaMohan210)

Shirish Padalkar (@_Garbage_)