Security Testing (A Complete Guide)

How to Test Application Security – Web and Desktop Application Security Testing Techniques

Need for Security Testing

The software industry has achieved solid recognition in this age. In recent decades, however, the cyber-world seems to be an even more dominating and driving force which is shaping up the new forms of almost every business.

Web-based ERP systems used today are the best evidence that IT has revolutionized our beloved global village. These days, websites are not only meant for publicity or marketing but they have evolved into stronger tools to cater to complete business needs.

Security Testing (A Complete Guide) (1)

A Complete Security Testing Guide

Web-based Payroll systems, Shopping Malls, Banking, and Stock Trade applications are not only being used by organizations but are also being sold as products today.

This means that online applications have gained the trust of customers and users regarding their vital feature named SECURITY. No doubt, that security factor is of primary value for desktop applications too.

However, when we talk about the web, the importance of security increases exponentially. If an online system cannot protect the transaction data, then no one will ever think of using it. Security is neither a word in search of its definition yet, nor a subtle concept. However, we would like to list some compliments on security.

Examples of Security flaws in an application

  • A Student Management System is insecure if the Admission branch can edit the data of the ‘Exam’ branch.
  • An ERP system is not secure if a DEO (data entry operator) can generate ‘Reports’.
  • An online Shopping Mall has no security if the customer’s Credit Card Details are not encrypted.
  • A custom software possesses inadequate security if an SQL query retrieves actual passwords of its users.

Security – Meaning

“Security means that authorized access is granted to protected data and unauthorized access is restricted”.

So, it has two major aspects – first is the protection of data and the second one is access to that data. Moreover, whether the application is desktop or web-based, security revolves around the two aforementioned aspects.

Let’s have an overview of security aspects for both desktop and web-based software applications.

Desktop and Web Security Testing

A desktop application should be secure not only regarding its access but also with respect to the organization and storage of its data.

Similarly, web applications demand, even more, security with respect to its access, along with data protection. A web developer should make the application immune to SQL Injections, Brute Force Attacks and XSS (cross-site scripting). Similarly, if the web application facilitates remote access points then these must be secure too.

Also, keep in mind that Brute Force Attack is not only related to web applications, but the desktop software is also vulnerable to this.

I hope this foreword is enough and now let me come to the point. Kindly accept my apology if you have so far thought that you are reading about the subject of this article. Though I have briefly explained software security and its major concerns, my topic is “Security Testing”.

Recommended Reading=> Web Application Security Testing

I will now explain how the features of security are implemented in software applications and how these should be tested. My focus will be on what’s and how’s of security testing, not on security.


Recommended Security Testing Tools

#1) Indusface WAS: Free DAST, Infra and Malware Scanner

Indusface-WAS

Indusface WAS helps in vulnerability testing for web, mobile, and API applications. The scanner is a powerful combination of application, Infrastructure, and Malware scanners. The standout feature is the 24X7 support that helps development teams with remediation guidance and removal of false positives.


#2) Invicti (formerly Netsparker)

Invicti Banner

Invicti is a web application security testing solution with the capabilities of automatic crawling and scanning for all types of legacy & modern web applications such as HTML5, Web 2.0, and Single Page Applications. It makes use of Proof-Based Scanning Technology and scalable scanning agents.

It gives you complete visibility even though you have a large number of assets to manage. It has many more functionalities like team management and vulnerability management. It can be integrated into CI/CD platforms like Jenkins, TeamCity, or Bamboo.


=> Contact us to suggest a listing here.

List of Top 8 Security Testing Techniques

#1) Access to Application

Whether it is a desktop application or a website, access security is implemented by “Roles and Rights Management”. It is often done implicitly while covering functionality.

For Example, in a Hospital Management System, a receptionist is least concerned about the laboratory tests as his job is to just register the patients and schedule their appointments with doctors.

So, all the menus, forms and screens related to lab tests will not be available to the Role of ‘Receptionist’. Hence, the proper implementation of roles and rights will guarantee the security of access.

How to Test: In order to test this, thorough testing of all roles and rights should be performed.

The tester should create several user accounts with different as well as multiple roles. He should then be able to use the application with the help of these accounts and should verify that every role has access to its own modules, screens, forms, and menus only. If the tester finds any conflict, then he should log a security issue with complete confidence.

This can also be understood as authentication and authorization testing which is very beautifully depicted in the below image:

Access to Application

So, basically, you need to test about ‘who you are’ and ‘what you can do’ for distinct users.

Some of the authentication tests include a test for password quality rules, test for default logins, test for password recovery, test captcha, test for logout functionality, test for password change, test for security question/answer, etc.

Similarly, some of the authorization tests include a test for path traversal, test for missing authorization, test for horizontal access control problems, etc.

#2) Data Protection

There are three aspects of data security. The first one is that a user can view or utilize only the data which he is supposed to use. This is also ensured by roles and rights

For Example, TSR (telesales representative) of a company can view the data of available stock, but cannot see how much raw material was purchased for production.

So, this aspect of security testing is already explained above. The second aspect of data protection is related to how that data is stored in the DB.

Further reading =>> What is Database Security Testing

All sensitive data must be encrypted to make it secure. Encryption should be strong, especially for sensitive data like passwords of user accounts, credit card numbers or other business-critical information.

The third and the last aspect is an extension of this second aspect. Proper security measures must be adopted when the flow of sensitive or business-critical data occurs. Whether this data floats between different modules of the same application or is transmitted to different applications, it must be encrypted to keep it safe.

Data Protection

How to Test Data Protection: The tester should query the database for ‘passwords’ of the user account, billing information of clients, other business-critical and sensitive data, should verify that all such data is saved in encrypted form in the DB.

Similarly, he must verify that the data is transmitted between different forms or screens after proper encryption only. Moreover, the tester should ensure that the encrypted data is properly decrypted at the destination. Special attention should be paid to different ‘submit’ actions.

The tester must verify that when the information is being transmitted between the client and server, it is not displayed in the address bar of a web browser in an understandable format. If any of these verifications fail, then the application definitely has a security flaw.

The tester should also check for proper use of salting (appending an extra secret value to the end input like password and thus making it stronger and more difficult to be cracked).

Insecure randomness should also be tested as it is a kind of vulnerability. Another way to test data protection is to check for weak algorithm usage.

For example, since HTTP is a clear text protocol, if sensitive data like user credentials are transmitted via HTTP, then it is a threat to application security. Instead of HTTP, sensitive data should be transferred via HTTPS (secured through SSL and TLS tunnels).

However, HTTPS increases the attack surface and thus it should be tested that the server configurations are proper and certificate validity is ensured.

#3) Brute-Force Attack

Brute Force Attack is mostly done by some software tools. The concept is that by using a valid user ID, the software attempts to guess the associated password by trying to log in again and again.

A simple example of security against such an attack is account suspension for a short period of time, as all mailing applications like Yahoo, Gmail and Hotmail do. If a specific number of consecutive attempts (mostly 3) fail to log in successfully, then that account is blocked for some time (30 minutes to 24 hrs).

Brute-Force Attack

How to test Brute-Force Attack: The tester must verify that some mechanism of account suspension is available and is working accurately. (S)He must attempt to login with invalid user IDs and Passwords alternatively to make sure that the software application blocks the account if continuous attempts are made to login with invalid credentials.

If the application is doing so, then it is secure against brute-force attack. Otherwise, this security vulnerability must be reported by the tester.

Testing for brute force can also be divided into two parts – black box testing and grey-box testing.

In Black box testing, the authentication method employed by the application is discovered and tested. Furthermore, the grey box testing is based on partial knowledge of password & account details and memory trade-off attacks.

Click here to explore the black box & grey box brute force testing along with examples.

The above three security aspects should be taken into account for both web and desktop applications while the following points are related to web-based applications only.

#4) SQL Injection And XSS (Cross-Site Scripting)

SQL Injection

Conceptually speaking, the theme of both these hacking attempts is similar, hence these are discussed together. In this approach, the malicious script is used by hackers in order to manipulate a website.

There are several ways to immune against such attempts. For all input fields on the website, field lengths should be defined small enough to restrict the input of any script

For example, the Last Name should have a field length of 30 instead of 255. There may be some input fields where large data input is necessary, for such fields proper validation of input should be performed prior to saving that data in the application.

Moreover, in such fields, any HTML tags or script tag input must be prohibited. In order to provoke XSS attacks, the application should discard script redirects from unknown or untrusted applications.

How to test SQL Injection and XSS: Tester must ensure that maximum lengths of all input fields are defined and implemented. (S)He should also ensure that the defined length of input fields does not accommodate any script input as well as tag input. Both of these can be easily tested.

For Example, If 20 is the maximum length specified for the ‘Name’ field, and input string “<p>thequickbrownfoxjumpsoverthelazydog” can verify both these constraints.

It should also be verified by the tester that the application does not support anonymous access methods. If any of these vulnerabilities exist, then the application is in danger.

Basically, SQL injection testing can be done through the following five ways:

  • Detection techniques
  • Standard SQL injection techniques
  • Fingerprint the database
  • Exploitation Techniques
  • SQL Injection Signature Invasion Techniques

Click here to read in detail about the above ways to test SQL injection.

XSS is also a type of injection which injects malicious script into a website. Click here to explore in-depth about testing for XSS.

#5) Service Access Points (Sealed and Secure Open)

Service Access Points (Sealed and Secure Open)

Today, businesses depend and collaborate with each other, the same holds good for applications especially websites. In such a case, both the collaborators should define and publish some access points for each other.

So far the scenario seems quite simple and straightforward but, for some web-based products like stock trading, things are not so simple and easy.

If there is a large target audience, then the access points should be open enough to facilitate all users, accommodating enough to fulfill all users’ requests and secure enough to cope with any security-trial.

How to Test Service Access Points: Let me explain it with the example of the stock trading web application; an investor (who wants to purchase the shares) should have access to current and historical data on stock prices. The user should be given the facility to download this historical data. This demands that the application should be open enough.

By accommodating and secure, I mean that the application should facilitate investors to trade freely (under the legislative regulations). They may purchase or sale 24/7 and the data of transactions must be immune to any hacking attack.

Moreover, a large number of users will be interacting with the application simultaneously, so the application should provide enough access points to entertain all the users.

In some cases, these access points can be sealed for unwanted applications or people. This depends on the business domain of the application and its users.

For example, a custom web-based Office Management System may recognize its users on the basis of IP Addresses and denies establishing a connection with all the other systems (applications) that do not fall in the range of valid IPs for that application.

The tester must ensure that all inter-network and intra-network access to the application is through trusted applications, machines (IPs) and users.

In order to verify that an open access point is secure enough, the tester must try to access it from different machines having both trusted and untrusted IP addresses.

Different sorts of real-time transactions should be tried in bulk to have good confidence in the application’s performance.  By doing so, the capacity of access points of the application will also be observed clearly.

The tester must ensure that the application entertains all communication requests from trusted IPs and applications only while all other requests are rejected.

Similarly, if the application has some open access point, then the tester should ensure that it allows (if required) uploading of data by users in a secure way. In this secure way, I mean about the file size limit, file type restriction and scanning of the uploaded file for viruses or other security threats.

This is how a tester can verify the security of an application with respect to its access points.

#6) Session Management

Session Management

A web session is a sequence of HTTP requests and response transactions linked to the same user. Session management tests check how session management is handled in the web app.

You can test for session expiry after particular idle time, session termination after maximum lifetime, session termination after log out, check for session cookie scope and duration, testing if a single user can have multiple simultaneous sessions, etc.

#7) Error handling

Error handling

Testing for Error handling includes:

Check for error codes: For example, test 408 request time-out, 400 bad requests, 404 not found, etc. To test this, you need to make certain requests on the page such that these error codes are returned.

The error code will be returned with a detailed message. This message should not contain any critical information that can be used for hacking purposes

Check for stack traces: It basically includes giving some exceptional input to the application such that the returned error message contains stack traces that have interesting information for hackers.

#8) Specific Risky Functionalities

Mainly, the two risky functionalities are payments and file uploads. These functionalities should be tested very well. For file uploads, you need to primarily test if any unwanted or malicious file upload is restricted.

For payments, you need to primarily test for injection vulnerabilities, insecure cryptographic storage, buffer overflows, password guessing, etc.

=> Contact us to suggest a listing here.

Further Reading:

Recommended Reading