SlideShare a Scribd company logo
OWASP TESTING METHODOLOGIES –Part2
• Identity management testing.
?
• Authentication Testing
Identity Management Testing
• Identity management testing required in each and every web application for the roles and
responsibilities.
• Various test cases required to prepare to check identity management testing like user
registration process, user enumeration, user account provisioning, user roles, unenforced
password policy.
• To test the user roles need to validate the system roles defined within the application
sufficiently based on the functionality and information.
• For the security tester need to assure that user roles are properly defined with their
respective functionality.
• To test this process the best way to execute it through manually also with the help of spider
tool can identify the respective access pages of different users.
Identity Management Testing
• User provisioning account also play important part for the identity management testing.
• Security Tester need to assure that the same user can not provision the user with high
privilege.
• Need to verify that the same user can not de- provision themselves.
• Need to verify if the administrator create multiple administrator If yes then need to check
business requirement.
• This process also test through the manual testing and with the burp suite tool.
• User enumeration attack is the first level of attack on the login pages.
• Here the attackers grab the user name without having any information of the user.
• Security Tester need to assure the response from the server for the correct and wrong
credentials remain same.
• Security tester can also verify the response length with the burp suite tool to enumerate the
account name.
Identity Management Testing
• In the below screenshot it reveals that the response length signify the presence of valid name
and invalid name.
Identity Management Testing
• When the user registered himself into the application, the password policy play the crucial
role.
• A weak password policy make the task of the attacker easier to crack the user credentials.
• Security tester need to assure that strong password policy have to be follow by the
application.
• Manual security testing help to identify that whether the application implemented the strong
password policy or not.
• Some of the recommended suggestion are that password should be equal to or greater than
eight character, it is combination of numeric, upper case and lower case character, it expire
after 90 days etc.
• Attackers generally use the password crackers tools like Brutus, wfuz,rainbow crack etc. to
crash the password.
Authentication Testing
• Authentication page is entry point for the attacker to access the restricted pages.
• Compromising the credentials means the efforts to create security restriction by developer
on other areas get inadequate.
• Security Tester need to create various test cases to identify the weakness on the
authentication pages.
• Attackers gain access of the credentials with the help of various techniques and tools.
• Various test cases need to be created to test the authentication testing.
• Some of the examples are credentials must passes over encrypted channel, default
credentials ,Bypass the authentication mechanism, browser cache the credentials ,weak
password policy, weak security challenge/answer, weak password change or reset
functionality, remember password functionality.
• Authentication testing process can be test through the manual testing and also with the
automated tools.
• Some of the good tools are IBM appscan, acunetix, Web inspect helps to identifying
authentication related vulnerability very easily.
• Various types of authentication mechanism used by the application are basic, form-based,
NTLM etc.
Authentication Testing
• To test the credentials is working over encrypted channel, identify manually with the proxy
tool or with the Wireshark tools.
• Tester need to verify that some times credentials working over https and http protocols too.
• Below screenshot shows that credentials passes over http protocol.
Authentication Testing
• In the below screenshot shows that user id and password travel over http in the base 64
encoded format.
• Various techniques can be used by the attackers to bypass the authentication mechanism of
the application.
• Also to bypass the authentication attacker can login into the application with SQL injection
attacks
For example the sql injection ‘ or 1=1– help the attackers to by pass the authentication:
Authentication Testing
Authentication Testing
• Any techniques which reached to the restricted pages without entering the correct
credentials can be named as bypass the authentication.
• Security tester must assure that restricted pages can only be accessible through login
mechanism
Authentication Testing
• In the below screenshot of paypal website shows that how the password echo from the
server when the invalid user or password entered by the user.
• Here the attackers can retrieve the html files from the browser history pages to view the
source code .
Authentication Testing
• As shown here the echo's password shown in the html source code of the page in the clear
text format.
Authentication Testing
• Security tester need to verify each mechanism where the credentials sent over the server
from the client machine.
• In the below screen shots of shopify website on the user password reset page, the
password value also travel over the GET method.
Authentication Testing
• Most of the time developer open the entry points of default credentials on the production
server too.
• Security tester need to verify the same with manually or with automated tools (brutus as
shown in below screen shot) to identify the default credentials access.
Authentication Testing
• Most of the ecommerce application required to have the remember me password
functionality because it become ease for the customer to re login into the application
without remembering the password.
• But this functionality become dangerous when the application business domain changed
from ecommerce to the banking domain.
• Remember me password save on the user browser which can retrieve easily through web
browser.
Authentication Testing
• Most of the application provide authority to the user to set the challenge question and
answers for password recovery.
• A lazy user always set the very easy question & answer which can easily breakable by the
attackers.
• Some of the examples are “what is your name”, what come after 8” etc.
• Attackers with the help of password crackers tools can easily break the security challenge.
• Security tester must ensure that such kind of weak challenges avoided into the application.
• Security Tester also need to verify the password reset and change password functionalities.
• Most of the application provide the authorization token to the registered email address.
Security tester must ensure that the reset link always bind with time period and destroy
after it use.
• The authorization token should be puzzle and lengthy so that attacker should not easily
predict the token id.
• Change password feature only allowed if the previous password feature also available with
the request.
• Security tester must ensure that no user can change the password of other user.
Ad

More Related Content

What's hot (20)

The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
Cigital
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
Security Testing for Web Application
Security Testing for Web ApplicationSecurity Testing for Web Application
Security Testing for Web Application
Precise Testing Solution
 
Web Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWeb Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
stevil1224
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 
Scaling-up and Automating Web Application Security Tech Talk
Scaling-up and Automating Web Application Security Tech TalkScaling-up and Automating Web Application Security Tech Talk
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
 
Step by step guide for web application security testing
Step by step guide for web application security testingStep by step guide for web application security testing
Step by step guide for web application security testing
Avyaan, Web Security Company in India
 
Owasp Top 10-2013
Owasp Top 10-2013Owasp Top 10-2013
Owasp Top 10-2013
n|u - The Open Security Community
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
Ezhilan Elangovan (Eril)
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
Sajid Hasan
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
vodQA
 
Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
Ted Husted
 
Security Testing
Security TestingSecurity Testing
Security Testing
Qualitest
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
Tjylen Veselyj
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
Mark Jayson Fuentes
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
Ashwini Paranjpe
 
Security Testing
Security TestingSecurity Testing
Security Testing
ISsoft
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
Cigital
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
Web Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWeb Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
stevil1224
 
Scaling-up and Automating Web Application Security Tech Talk
Scaling-up and Automating Web Application Security Tech TalkScaling-up and Automating Web Application Security Tech Talk
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
Sajid Hasan
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
vodQA
 
Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
Ted Husted
 
Security Testing
Security TestingSecurity Testing
Security Testing
Qualitest
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
Tjylen Veselyj
 
A new web application vulnerability assessment framework
A new web application vulnerability assessment frameworkA new web application vulnerability assessment framework
A new web application vulnerability assessment framework
Mark Jayson Fuentes
 
Security Testing
Security TestingSecurity Testing
Security Testing
ISsoft
 

Similar to Owasp security testing methodlogies –part2 (20)

Web Application Scanning Flow and features.pptx
Web Application Scanning Flow and features.pptxWeb Application Scanning Flow and features.pptx
Web Application Scanning Flow and features.pptx
alphaa2test
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
Sam Bowne
 
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdf
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdfLesson 01 - KTPM - Introduction To Software Testing (P1).pdf
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdf
DoManh15
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
software-engineering-book
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
Sam Bowne
 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense MechanismsCh 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Sam Bowne
 
apex security demo.ppsx
apex security demo.ppsxapex security demo.ppsx
apex security demo.ppsx
siavosh kaviani
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
DrBasemMohamedElomda
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
sakshisoni076
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
RapidValue
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
Manahari Darshika Pemarathna
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Secured REST Microservices with Spring Cloud
Secured REST Microservices with Spring CloudSecured REST Microservices with Spring Cloud
Secured REST Microservices with Spring Cloud
Orkhan Gasimov
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
Appsecco
 
Security Design Principles for developing secure application .pptx
Security Design Principles for developing secure application .pptxSecurity Design Principles for developing secure application .pptx
Security Design Principles for developing secure application .pptx
azida3
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
Sameer Paradia
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
Puskar Bhandari
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Web Application Scanning Flow and features.pptx
Web Application Scanning Flow and features.pptxWeb Application Scanning Flow and features.pptx
Web Application Scanning Flow and features.pptx
alphaa2test
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
Sam Bowne
 
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdf
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdfLesson 01 - KTPM - Introduction To Software Testing (P1).pdf
Lesson 01 - KTPM - Introduction To Software Testing (P1).pdf
DoManh15
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
software-engineering-book
 
CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
Sam Bowne
 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense MechanismsCh 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Sam Bowne
 
What is penetration testing
What is penetration testingWhat is penetration testing
What is penetration testing
sakshisoni076
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
RapidValue
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 
Secured REST Microservices with Spring Cloud
Secured REST Microservices with Spring CloudSecured REST Microservices with Spring Cloud
Secured REST Microservices with Spring Cloud
Orkhan Gasimov
 
Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
Appsecco
 
Security Design Principles for developing secure application .pptx
Security Design Principles for developing secure application .pptxSecurity Design Principles for developing secure application .pptx
Security Design Principles for developing secure application .pptx
azida3
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
Sameer Paradia
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
nanangAris1
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
Puskar Bhandari
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
Vaibhav Khanna
 
Ad

Recently uploaded (20)

Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Gary Arora
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdfKit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Kit-Works Team Study_팀스터디_김한솔_nuqs_20250509.pdf
Wonjun Hwang
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Harmonizing Multi-Agent Intelligence | Open Data Science Conference | Gary Ar...
Gary Arora
 
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Kit-Works Team Study_아직도 Dockefile.pdf_김성호
Wonjun Hwang
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Ad

Owasp security testing methodlogies –part2

  • 1. OWASP TESTING METHODOLOGIES –Part2 • Identity management testing. ? • Authentication Testing
  • 2. Identity Management Testing • Identity management testing required in each and every web application for the roles and responsibilities. • Various test cases required to prepare to check identity management testing like user registration process, user enumeration, user account provisioning, user roles, unenforced password policy. • To test the user roles need to validate the system roles defined within the application sufficiently based on the functionality and information. • For the security tester need to assure that user roles are properly defined with their respective functionality. • To test this process the best way to execute it through manually also with the help of spider tool can identify the respective access pages of different users.
  • 3. Identity Management Testing • User provisioning account also play important part for the identity management testing. • Security Tester need to assure that the same user can not provision the user with high privilege. • Need to verify that the same user can not de- provision themselves. • Need to verify if the administrator create multiple administrator If yes then need to check business requirement. • This process also test through the manual testing and with the burp suite tool. • User enumeration attack is the first level of attack on the login pages. • Here the attackers grab the user name without having any information of the user. • Security Tester need to assure the response from the server for the correct and wrong credentials remain same. • Security tester can also verify the response length with the burp suite tool to enumerate the account name.
  • 4. Identity Management Testing • In the below screenshot it reveals that the response length signify the presence of valid name and invalid name.
  • 5. Identity Management Testing • When the user registered himself into the application, the password policy play the crucial role. • A weak password policy make the task of the attacker easier to crack the user credentials. • Security tester need to assure that strong password policy have to be follow by the application. • Manual security testing help to identify that whether the application implemented the strong password policy or not. • Some of the recommended suggestion are that password should be equal to or greater than eight character, it is combination of numeric, upper case and lower case character, it expire after 90 days etc. • Attackers generally use the password crackers tools like Brutus, wfuz,rainbow crack etc. to crash the password.
  • 6. Authentication Testing • Authentication page is entry point for the attacker to access the restricted pages. • Compromising the credentials means the efforts to create security restriction by developer on other areas get inadequate. • Security Tester need to create various test cases to identify the weakness on the authentication pages. • Attackers gain access of the credentials with the help of various techniques and tools. • Various test cases need to be created to test the authentication testing. • Some of the examples are credentials must passes over encrypted channel, default credentials ,Bypass the authentication mechanism, browser cache the credentials ,weak password policy, weak security challenge/answer, weak password change or reset functionality, remember password functionality. • Authentication testing process can be test through the manual testing and also with the automated tools. • Some of the good tools are IBM appscan, acunetix, Web inspect helps to identifying authentication related vulnerability very easily. • Various types of authentication mechanism used by the application are basic, form-based, NTLM etc.
  • 7. Authentication Testing • To test the credentials is working over encrypted channel, identify manually with the proxy tool or with the Wireshark tools. • Tester need to verify that some times credentials working over https and http protocols too. • Below screenshot shows that credentials passes over http protocol.
  • 8. Authentication Testing • In the below screenshot shows that user id and password travel over http in the base 64 encoded format. • Various techniques can be used by the attackers to bypass the authentication mechanism of the application.
  • 9. • Also to bypass the authentication attacker can login into the application with SQL injection attacks For example the sql injection ‘ or 1=1– help the attackers to by pass the authentication: Authentication Testing
  • 10. Authentication Testing • Any techniques which reached to the restricted pages without entering the correct credentials can be named as bypass the authentication. • Security tester must assure that restricted pages can only be accessible through login mechanism
  • 11. Authentication Testing • In the below screenshot of paypal website shows that how the password echo from the server when the invalid user or password entered by the user. • Here the attackers can retrieve the html files from the browser history pages to view the source code .
  • 12. Authentication Testing • As shown here the echo's password shown in the html source code of the page in the clear text format.
  • 13. Authentication Testing • Security tester need to verify each mechanism where the credentials sent over the server from the client machine. • In the below screen shots of shopify website on the user password reset page, the password value also travel over the GET method.
  • 14. Authentication Testing • Most of the time developer open the entry points of default credentials on the production server too. • Security tester need to verify the same with manually or with automated tools (brutus as shown in below screen shot) to identify the default credentials access.
  • 15. Authentication Testing • Most of the ecommerce application required to have the remember me password functionality because it become ease for the customer to re login into the application without remembering the password. • But this functionality become dangerous when the application business domain changed from ecommerce to the banking domain. • Remember me password save on the user browser which can retrieve easily through web browser.
  • 16. Authentication Testing • Most of the application provide authority to the user to set the challenge question and answers for password recovery. • A lazy user always set the very easy question & answer which can easily breakable by the attackers. • Some of the examples are “what is your name”, what come after 8” etc. • Attackers with the help of password crackers tools can easily break the security challenge. • Security tester must ensure that such kind of weak challenges avoided into the application. • Security Tester also need to verify the password reset and change password functionalities. • Most of the application provide the authorization token to the registered email address. Security tester must ensure that the reset link always bind with time period and destroy after it use. • The authorization token should be puzzle and lengthy so that attacker should not easily predict the token id. • Change password feature only allowed if the previous password feature also available with the request. • Security tester must ensure that no user can change the password of other user.
  翻译: