SlideShare a Scribd company logo
Web Application Penetration Test

Why (background)?

Web applications have become increasingly vulnerable to different
forms of hacker attacks. According to a Gartner Report, 75% of
attacks today occur at the application level. A Forrester survey states
that “people are now attacking through applications, because it’s
easier than through the network layer.”

Despite common use of defenses such as firewalls and intrusion
detection or prevention systems, hackers can access valuable
proprietary and customer data, shutdown websites and servers and
defraud businesses, as well as introduce serious legal liability without
being stopped or, in many cases, even detected.

To counter this problem, Cyber 51 Ltd. offers a comprehensive
security risk assessment solution - Web Application Penetration Testing
- to identify, analyze and report vulnerabilities in a given application.
As part of this service, Cyber 51 Ltd. attempts to identify both inherent
and potential security risks that might work as entry points for the
hacker. We believe vulnerabilities could be present in a web
application due to inadvertent flaws left behind during development,
security issues in the underlying environment and misconfigurations in
one or more components like database, web server etc.

When conducting a Web Application Penetration Testing assignment,
Cyber 51 Ltd. adopts a strong technology and process-based approach
supported by a well-documented methodology to identify potential
security flaws in the application and underlying environment.
Adherence to industry standards such as OWASP, customized tests
based on technology and business logic, skilled and certified security
engineers, risk assessment on the vulnerabilities found, scoring
system based on CVSS (Common Vulnerability Scoring System) make
us different from the other vendors in this space.

Customers would benefit from web application penetration testing on
the application as it gives an in-depth analysis of your current security
posture, recommendations for reducing exposure to currently
identified vulnerabilities are highlighted and it allows the customer to
make more informed decisions, enabling management of the


            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
company’s exposure to threats. The security assessment report
submitted on completion of the engagement provides a detailed and
prioritized mitigation plan to help customers in addressing security
issues in a phased manner.

How (Our Methodology)?

Configuration Management Analysis:

The infrastructure used by the Web application will be evaluated from
a security perspective.

The tests to be performed are as follows:

     • TLS and SSL tests.

     • Security Testing over the listener of management system
     databases.

     • Testing the configuration of the infrastructure and its
     relationship with the Web application, vulnerability analysis,
     analysis of authentication mechanisms and identification of all
     the ports used by the Web application.

     • Testing the application settings, search through directories and
     regular files, comments from developers and the eventual
     acquisition and operational analysis of logs generated by the
     application.

     • Searching for old files, backups, logs of operations and other
     files used by the Web application.

     • Search and test management interfaces or web application
     related infrastructure.

     • Test various HTTP methods supported and the possibilities of
     XST (Cross-Site Tracing).




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
Analysis of Authentication:

We will evaluate the various mechanisms and aspects of the web
application authentication.

The tests to be performed are as follows:

     • Credentials management

     • Enumeration of users and user accounts easily identifiable.

     • Proof of identification credentials brute force, based on
     information found or inferred.

     • Testing the authentication mechanisms looking for evasion

     • Logouts mechanisms and weaknesses associated with the
     Internet browser cache.

     • Strength tests over captchas and test multi-factor
     authentication.



Session Management Analysis:

We will evaluate the different mechanisms and management aspects
of web application sessions.

The tests to be performed are as follows:

     • Session management scheme will be tested.

     • CSRF (Cross-Site Request Forgery).

     • Test attributes Cookies.

     • Setting sessions.

     • Evidence of attributes exposed session and repetition.




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
Analysis of Authorization:

We will evaluate the various mechanisms and aspects of web
application authorization.

The tests to be performed are as follows:

     • Privilege escalation.

     • "Path Traversal".

     • Evidence of evasion of clearance mechanisms.

     • Testing the "business logic" of the Web application, avoiding,
     altering, or cheating their relationships within the application.



Data Validation Analysis:

We will evaluate the various repositories, access and protection
mechanisms related to the validation of data used by the Web
application.

The tests to be performed are as follows:

     • Test various XSS (Cross Site Scripting) and "Cross Site
     Flashing."

     • SQL Injection tests.

     • LDAP injection tests.

     • Evidence of ORM injection.

     • XML Injection tests.

     • SSI injection testing.

     • Testing XPath Injection.

     • Injection Test IMAP / SMTP.



            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
• Evidence Code Injection.

     • Injection Test Operating System Commands.

     • Evidence of buffer overflow.

     • Evidence of Splitting / Smuggling of HTTP.

     • Evidence of evasion of clearance mechanisms.

     • Evidence of privilege escalation.



Analysis of Web Services:

We will evaluate the web application services related to SOA (Service
Oriented Architecture):

The tests to be performed are as follows:

     • Security testing of WSDL.

     • Evidence of structural Security of XML.

     • Testing of security at XML content.

     • Test HTTP GET parameters / REST.

     • Tests with contaminated SOAP attachments.

     • Repeat testing of web services.

     • Testing AJAX Web application vulnerabilities regarding this
     technology.




            Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk

More Related Content

PPTX
A new web application vulnerability assessment framework
PPTX
Web application vulnerability assessment
PDF
Web Application Security 101 - 04 Testing Methodology
PDF
Testing Web Application Security
PDF
we45 - Web Application Security Testing Case Study
PPSX
Web application testing
PPTX
Security Testing
PDF
The Complete Web Application Security Testing Checklist
A new web application vulnerability assessment framework
Web application vulnerability assessment
Web Application Security 101 - 04 Testing Methodology
Testing Web Application Security
we45 - Web Application Security Testing Case Study
Web application testing
Security Testing
The Complete Web Application Security Testing Checklist

What's hot (20)

PPT
Get Ready for Web Application Security Testing
PPT
Step by step guide for web application security testing
PDF
Web Application Security Testing Tools
PPTX
Owasp first5 presentation
PPT
Security Operations
PDF
Security testing presentation
PPTX
OTG - Practical Hands on VAPT
PDF
Web application sec_3
PPTX
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
PPTX
Security testing
PPT
Security Testing
PPT
Web 2.0 Hacking
PPTX
Application Security-Understanding The Horizon
PPTX
Secure Code Warrior - Defense in depth
PPTX
Web Application Security 101
PDF
Building a secure BFF at Postman
PPTX
SSRF exploit the trust relationship
PDF
Owasp top 10
PPTX
Fundamental Aspects of Security Testing
PPTX
Owasp top 10 2017
Get Ready for Web Application Security Testing
Step by step guide for web application security testing
Web Application Security Testing Tools
Owasp first5 presentation
Security Operations
Security testing presentation
OTG - Practical Hands on VAPT
Web application sec_3
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
Security testing
Security Testing
Web 2.0 Hacking
Application Security-Understanding The Horizon
Secure Code Warrior - Defense in depth
Web Application Security 101
Building a secure BFF at Postman
SSRF exploit the trust relationship
Owasp top 10
Fundamental Aspects of Security Testing
Owasp top 10 2017
Ad

Viewers also liked (17)

PPT
я і ураїна. тварини
DOC
PDF
Presentazione aquarius
PPTX
Sd pertemuan 1 & 2
PPT
група 6
PDF
Upvc fascia
PPT
Виртуальная сфера - Безопасность - Хакеры и Терроризм
PPTX
Dan Bannino
PPT
One Library Per Village
ZIP
AA Section 8-5
PDF
Thong bao thi tuyen chuc danh 2015
PDF
Primary vlan
DOCX
Siklus asam sitrat
DOCX
Translation #9 cello poem no.3 (chinese and malay)
PDF
Nesteggs 401 K Savings Plan 2009
PPT
Transformar imágenes power point
я і ураїна. тварини
Presentazione aquarius
Sd pertemuan 1 & 2
група 6
Upvc fascia
Виртуальная сфера - Безопасность - Хакеры и Терроризм
Dan Bannino
One Library Per Village
AA Section 8-5
Thong bao thi tuyen chuc danh 2015
Primary vlan
Siklus asam sitrat
Translation #9 cello poem no.3 (chinese and malay)
Nesteggs 401 K Savings Plan 2009
Transformar imágenes power point
Ad

Similar to Web Application Penetration Test (20)

PPTX
How to Test for The OWASP Top Ten
PDF
Common Web Application Attacks
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
PDF
CSS17: Houston - Protecting Web Apps
PPTX
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Soteria Cybersecurity Healthcheck-FB01
KEY
EISA Considerations for Web Application Security
PPT
Code Quality - Security
PDF
Using Analyzers to Resolve Security Problems
PPTX
Web applications security conference slides
PDF
Security Testing Approach for Web Application Testing.pdf
PPTX
Web Application Scanning Flow and features.pptx
PDF
owasp-top-10 presentation dhs ad health .
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PDF
Dealing with Web Application Security, Regulation Style
PPTX
Security testautomation
PDF
Ownux global Aug 2023.pdf
PPT
Security Testing
How to Test for The OWASP Top Ten
Common Web Application Attacks
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
CSS17: Houston - Protecting Web Apps
CSS 17: NYC - Protecting your Web Applications
Soteria Cybersecurity Healthcheck-FB01
EISA Considerations for Web Application Security
Code Quality - Security
Using Analyzers to Resolve Security Problems
Web applications security conference slides
Security Testing Approach for Web Application Testing.pdf
Web Application Scanning Flow and features.pptx
owasp-top-10 presentation dhs ad health .
Application Security Testing for Software Engineers: An approach to build sof...
Dealing with Web Application Security, Regulation Style
Security testautomation
Ownux global Aug 2023.pdf
Security Testing

More from martinvoelk (16)

PPT
Cyber51 Company Presentation Public
PDF
Consulting Flyer
PDF
Penetration Testing Services Technical Description Cyber51
PDF
VoIp Security Services Technical Description Cyber51
PDF
Vulnerability Assesment Subscriptions Cyber51
PDF
Why Penetration Testing Services Cyber51
PDF
Why Penetration Tests Are Important Cyber51
PDF
Ppctrainer Offers
PDF
AdWords Training & AdWords Consulting
PPT
AdWords Training & AdWords Consulting
PDF
Basic Adwords Course Outline
PDF
Pronetexpert Cisco Ccde Bootcamp Training Courses
PDF
CCIE Bootcamp Training Courses
PDF
Servicios de la Seguridad delos Redes
PDF
IT Network Security Services
PPT
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate
Cyber51 Company Presentation Public
Consulting Flyer
Penetration Testing Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
Vulnerability Assesment Subscriptions Cyber51
Why Penetration Testing Services Cyber51
Why Penetration Tests Are Important Cyber51
Ppctrainer Offers
AdWords Training & AdWords Consulting
AdWords Training & AdWords Consulting
Basic Adwords Course Outline
Pronetexpert Cisco Ccde Bootcamp Training Courses
CCIE Bootcamp Training Courses
Servicios de la Seguridad delos Redes
IT Network Security Services
ProNetExpert Cisco Premier Partner & Cisco Learning Partner Associate

Web Application Penetration Test

  • 1. Web Application Penetration Test Why (background)? Web applications have become increasingly vulnerable to different forms of hacker attacks. According to a Gartner Report, 75% of attacks today occur at the application level. A Forrester survey states that “people are now attacking through applications, because it’s easier than through the network layer.” Despite common use of defenses such as firewalls and intrusion detection or prevention systems, hackers can access valuable proprietary and customer data, shutdown websites and servers and defraud businesses, as well as introduce serious legal liability without being stopped or, in many cases, even detected. To counter this problem, Cyber 51 Ltd. offers a comprehensive security risk assessment solution - Web Application Penetration Testing - to identify, analyze and report vulnerabilities in a given application. As part of this service, Cyber 51 Ltd. attempts to identify both inherent and potential security risks that might work as entry points for the hacker. We believe vulnerabilities could be present in a web application due to inadvertent flaws left behind during development, security issues in the underlying environment and misconfigurations in one or more components like database, web server etc. When conducting a Web Application Penetration Testing assignment, Cyber 51 Ltd. adopts a strong technology and process-based approach supported by a well-documented methodology to identify potential security flaws in the application and underlying environment. Adherence to industry standards such as OWASP, customized tests based on technology and business logic, skilled and certified security engineers, risk assessment on the vulnerabilities found, scoring system based on CVSS (Common Vulnerability Scoring System) make us different from the other vendors in this space. Customers would benefit from web application penetration testing on the application as it gives an in-depth analysis of your current security posture, recommendations for reducing exposure to currently identified vulnerabilities are highlighted and it allows the customer to make more informed decisions, enabling management of the Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 2. company’s exposure to threats. The security assessment report submitted on completion of the engagement provides a detailed and prioritized mitigation plan to help customers in addressing security issues in a phased manner. How (Our Methodology)? Configuration Management Analysis: The infrastructure used by the Web application will be evaluated from a security perspective. The tests to be performed are as follows: • TLS and SSL tests. • Security Testing over the listener of management system databases. • Testing the configuration of the infrastructure and its relationship with the Web application, vulnerability analysis, analysis of authentication mechanisms and identification of all the ports used by the Web application. • Testing the application settings, search through directories and regular files, comments from developers and the eventual acquisition and operational analysis of logs generated by the application. • Searching for old files, backups, logs of operations and other files used by the Web application. • Search and test management interfaces or web application related infrastructure. • Test various HTTP methods supported and the possibilities of XST (Cross-Site Tracing). Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 3. Analysis of Authentication: We will evaluate the various mechanisms and aspects of the web application authentication. The tests to be performed are as follows: • Credentials management • Enumeration of users and user accounts easily identifiable. • Proof of identification credentials brute force, based on information found or inferred. • Testing the authentication mechanisms looking for evasion • Logouts mechanisms and weaknesses associated with the Internet browser cache. • Strength tests over captchas and test multi-factor authentication. Session Management Analysis: We will evaluate the different mechanisms and management aspects of web application sessions. The tests to be performed are as follows: • Session management scheme will be tested. • CSRF (Cross-Site Request Forgery). • Test attributes Cookies. • Setting sessions. • Evidence of attributes exposed session and repetition. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 4. Analysis of Authorization: We will evaluate the various mechanisms and aspects of web application authorization. The tests to be performed are as follows: • Privilege escalation. • "Path Traversal". • Evidence of evasion of clearance mechanisms. • Testing the "business logic" of the Web application, avoiding, altering, or cheating their relationships within the application. Data Validation Analysis: We will evaluate the various repositories, access and protection mechanisms related to the validation of data used by the Web application. The tests to be performed are as follows: • Test various XSS (Cross Site Scripting) and "Cross Site Flashing." • SQL Injection tests. • LDAP injection tests. • Evidence of ORM injection. • XML Injection tests. • SSI injection testing. • Testing XPath Injection. • Injection Test IMAP / SMTP. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk
  • 5. • Evidence Code Injection. • Injection Test Operating System Commands. • Evidence of buffer overflow. • Evidence of Splitting / Smuggling of HTTP. • Evidence of evasion of clearance mechanisms. • Evidence of privilege escalation. Analysis of Web Services: We will evaluate the web application services related to SOA (Service Oriented Architecture): The tests to be performed are as follows: • Security testing of WSDL. • Evidence of structural Security of XML. • Testing of security at XML content. • Test HTTP GET parameters / REST. • Tests with contaminated SOAP attachments. • Repeat testing of web services. • Testing AJAX Web application vulnerabilities regarding this technology. Cyber 51 Ltd. | www.cyber51.co.uk | info@cyber51.co.uk