Entries Tagged 'Security testing' ↓

Getting Started with Web Application Penetration Testing

Penetration testing aka Pen Test is the most commonly used security testing technique for web applications.

Web Application Penetration Testing is done by simulating unauthorized attacks internally or externally to get access to sensitive data.

A web penetration helps end user find out the possibility for a hacker to access the data from the internet, find about the security of their email servers and also get to know how secure the web hosting site and server are.

Continue reading →

How to Test Web Application Security Using Acunetix Web Vulnerability Scanner (WVS) – Hands on Review

Web applications and websites are core components of any business these days. As the number of websites increases, attackers are also more active for hacking websites and stealing important business data.

With this threat, it’s becoming important to have Website vulnerability scanning as a part of compete test cycle.

------------

Today, we are going to review a tool for security audit of web applications and websites – Acunetix Web Vulnerability Scanner (WVS). Acunetix WVS is the tool of choice for SQL Injection testing, Cross-site scripting (XSS) and OWASP top 10 other vulnerabilities.
Continue reading →

37 Powerful Penetration Testing Tools For Every Penetration Tester

Wouldn’t it be fun if a company hired you to hack its website/ network/ Server? Well, Yeah!!!

Penetration testing, commonly called as pen-testing is a on a roll in the testing circle these days. The reason is not hard to guess – with the change in the way computer systems are used and built, security takes the center stage. Even though companies realize they can’t make every system 100% secure, they are extremely interested to know exactly what kind of security issues they are dealing with. That’s where Pen-testing comes handy with its use of ethical hacking techniques.

Continue reading →

180+ Sample Test Cases for Testing Web and Desktop Applications – Comprehensive Testing Checklist

This is a testing checklist for web and desktop applications.

Note – This article is little long (over 2700 words). My goal is to share one of the most comprehensive testing checklist ever written and this is not yet done. I’ll keep updating this post in future with more scenarios. If you don’t have time to read it now, please feel free to share with your friends and bookmark it for later.

Make testing checklist as an integral part of test cases writing process. Using this checklist you can easily create hundreds of test cases for testing web or desktop applications. These are all general test cases and should be applicable for almost all kind of applications. Refer these tests while writing test cases for your project and I’m sure you will cover most testing types except the application specific business rules provided in your SRS documents.

Software Testing Checklist

Though this is a common checklist, I recommend preparing a standard testing checklist tailored to your specific needs using below test cases in addition with application specific tests.

Importance of Using Checklist for Testing:
Continue reading →

Penetration Testing – Complete Guide with Sample Test Cases

What is Penetration Testing?
It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. Purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to system. Once vulnerability is identified it is used to exploit system in order to gain access to sensitive information.

Causes of vulnerabilities:
– Design and development errors
– Poor system configuration
– Human errors

Why Penetration testing?

– Financial data must be secured while transferring between different systems
– Many clients are asking for pen testing as part of the software release Continue reading →