Entries Tagged 'Security testing' ↓

Getting Started with Web Application Penetration Testing

Penetration testing aka Pen Test is the most commonly used security testing technique for web applications.

Web Application Penetration Testing is done by simulating unauthorized attacks internally or externally to get access to sensitive data.

A web penetration helps end user find out the possibility for a hacker to access the data from the internet, find about the security of their email servers and also get to know how secure the web hosting site and server are.

Continue reading →

How to Test Web Application Security Using Acunetix Web Vulnerability Scanner (WVS) – Hands on Review

Web applications and websites are core components of any business these days. As the number of websites increases, attackers are also more active for hacking websites and stealing important business data.

With this threat, it’s becoming important to have Website vulnerability scanning as a part of complete test cycle.


Today, we are going to review a tool for a security audit of web applications and websites – Acunetix Web Vulnerability Scanner (WVS). Acunetix WVS is the tool of choice for SQL Injection testing, Cross-site scripting (XSS) and OWASP top 10 other vulnerabilities.
Continue reading →

37 Most Powerful Penetration Testing Tools (Security Testing Tools)

A list of all the best and most popular Pen Testing/Security Testing tools required for every penetration tester is addressed in this article.

Wouldn’t it be fun if a company hired you to hack its website/ network/ Server? Well, Yeah!

Penetration testing, commonly known as pen-testing is on a roll in the testing circle nowadays. The reason is not too hard to guess – with the change in the way computer systems are used and built, security takes the center stage.  Continue reading →

180+ Sample Test Cases for Testing Web and Desktop Applications – Comprehensive Testing Checklist

This is a testing checklist for web and desktop applications.

Note – This article is little long (over 2700 words). My goal is to share one of the most comprehensive testing checklist ever written and this is not yet done. I’ll keep updating this post in future with more scenarios. If you don’t have time to read it now, please feel free to share with your friends and bookmark it for later.

Make testing checklist as an integral part of test cases writing process. Using this checklist you can easily create hundreds of test cases for testing web or desktop applications. These are all general test cases and should be applicable for almost all kind of applications. Refer these tests while writing test cases for your project and I’m sure you will cover most testing types except the application specific business rules provided in your SRS documents.

Software Testing Checklist

Though this is a common checklist, I recommend preparing a standard testing checklist tailored to your specific needs using below test cases in addition with application specific tests.

Importance of Using Checklist for Testing:
Continue reading →

Penetration Testing – Complete Guide with Sample Test Cases

What is Penetration Testing?

It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. The weak points of a system are exploited in this process through an authorized simulated attack.

The purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to the system. Once the vulnerability is identified it is used to exploit the system in order to gain access to sensitive information.

A penetration test is also known as pen test and a penetration tester is also referred as an ethical hacker.

Continue reading →