Security Test Cases Flashcards
Steps in Penetration Testing
- Reconnaissance (discovery and enumeration)
- Attack and exploitation
- Removal of evidence
- Reporting
Common Methods Security testing - Fuzzing
Brute Force providing multitude of inputs.
May detect input validation errors, buffer overflows.
Used in White, black, gray box testing.
Generation-based fuzz testing uses the specifications of input streams to determine the data streams that are to be used in testing. Mutation-based fuzzers take known good traffic and mutate it in specific ways to create new input streams for testing.
Common Methods Security testing - Simulation
- in Production like env. helping discover issues associated with the instantiation of an application and its operation in the production environment.
- typically last line of defense.
- performance testing
Common Methods Security testing - Scaning
Scan for
- networks, OS fingerprinting,
- compliance with PCI DD or sarbanes oxley,
- vulnerabilities
Common Methods Security testing - Failure mode or Break testing
Break testing is where one uses inputs that are specifically designed to trigger failures.
- stress/load testing
- simulate conditions that result in incorrect outputs
FIPS -2 (Federal Information Processing Standards)
specifies requirements, specifications, and testing of cryptographic systems for the U.S. federal government.