Professional Documents
Culture Documents
User and critically important company information is managed using web applications. For this
reason, web applications serve as a door for attacks. The vulnerabilities present in the application
can be exploited by an attacker. Even with the rapid development of Internet technologies, web
applications have not achieved the desired security levels. As a result, web servers and web
applications are popular attack targets.
With the large number of highly skilled hackers in the world, security should be a huge
concern for anyone building a web application. We need to test how secure our web application
is from both external and internal threats. The security of our web application should be planned
for and verified by qualified security specialists.
In this section I provide further details about the particular techniques that we have
investigated, including existing approaches and a new approach to test web application with full
protection.
CONTENTS
Page No
Chapter 1
: INTRODUCTION
01
1.1 OBJECTIVE
Chapter 2
03
1.1.CLASSES OF THREATS
1.3 SECURITY TESTING TECHNIQUES
1.4 SECURITY TESTING APPROACH
Chapter 3
08
Chapter 4
09
Chapter 5
10
1.1FUNCTIONALITY
1.2 USABILITY
1.3 INTERFACE
1.4COMPATIBILITY
1.5PERFORMANCE
1.6SECURITY
15
Page No
Chapter 7
: PENETRATION TESTING
26
Chapter 9
ATTACKS
Chapter 10
43
58
REFERENCES
59