Preview

Penetration-Testing

Good Essays
Open Document
Open Document
14938 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Penetration-Testing
Comparison of penetration testing tools for web applications Frank van der Loo

Supervisor: Erik Poll

Research number: 653
Student number: 0314005

August 15, 2011

Executive summary
Testing the security of web applications with automated penetration testing tools produces relatively quick and easy results. However there are a lot of such tools, both commercial and free. In this thesis a selection of such tools are tested against a number of dierent test cases to compare the tools and nd out the quality of such tools. For each test case the number of reported vulnerabilities by the tools is recorded per type of vulnerability. For each type of vulnerability the reported vulnerabilities are manually checked for false positives and false negatives. The tools leave much to be desired. The tools appear to have problems with web applications that use techniques that are a bit more advanced than average pages, such as cookies for logging in or session ids. Further, the tools produce quite a lot of false positives and duplicate results. Also, all tools had false negatives. These false positives, duplicates and false negatives would have to be checked manually. This can take hours, especially for big web applications.
Some of the tools also have problems with crawling a web application when techniques such as includes are used. Another problem is that the tools are mainly good in nding SQL injection and XSS, while other vulnerabilities are not always detected by every tool. Other problems of the tools are that they depend on the server for some vulnerabilities (mainly SQL injection) and fail detection of this vulnerability for certain servers. Some of the tools have their own specic problems that causes the tools to miss certain vulnerabilities.
Ultimately, it is impossible to name a tool that is the best. The usefulness of the tools depends on the web application that is going to be tested and the vulnerabilities that it is going to

You May Also Find These Documents Helpful

  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    Tackett, J. and Gunter, D. (1997). Special edition. Using Linux. 3rd edition. Indianapolis, IN. QUE Corporation.…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    A CVE (Common Vulnerabilities and Exposures) are known vulnerabilities and also show you how to patch them. They are from the Mitre Corporation but are under contract for Homeland Security and NCSD.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    C3 Coursework

    • 2611 Words
    • 11 Pages

    I will then compare the methods in terms of speed of convergence and ease of use with hardware/software…

    • 2611 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    This tool is used to identify the path that must be followed to reach one system from another. It…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Security Assessment

    • 824 Words
    • 4 Pages

    Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat.…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Good Essays

    This paper features information, articles and links about the career of a Computer Forensics Investigator.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 944 Words
    • 4 Pages

    source are explanations of how these tools are used and the reason for choosing or…

    • 944 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Preeyavis Pringsulaka Faculty of Science and Technology Assumption University Bangkok 10240, Thailand 617-372-5440 iampree@yahoo.com Abstract—This paper1 proposes a technique called Coverall algorithm, which is based on a conventional attempt to reduce cases that have to be tested for any given software. The approach utilizes the advantage of Regression Testing where fewer numbers of test cases would lessen time consumption of the testing as a whole. The technique also offers a mean to perform test cases generation automatically. Comparing to the technique in most of the literatures where tester have no option but to perform the test cases generation manually, the proposed technique provides a better option. As for the test cases reduction, the technique uses simple algebraic condition to assign fixed values to variables (maximum, minimum and constant variables). By doing this, the variables value would be limited within a definite range, resulting in fewer numbers of possible test cases in process and also the technique can uses in program loops and arrays. After comparative assessment of the technique, it has been confirmed that the technique could reduce number of test cases by more than 99%. As for the other features of the technique, automatic test cases generation, all four step of test cases generation in the proposed technique have been converted into an operational program. The success of the program in performing these steps is indeed significant since it represents a practical means in performing test cases generation automatically by a computer algorithm. TABLE OF CONTENTS 1. INTRODUCTION ......................................................1 2. PROBLEM DESCRIPTION ........................................1 3. LITERATURE REVIEWS ..........................................2 4. PROPOSED TECHNIQUE ..........................................3 5. EVALUATION…

    • 3228 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    software testing

    • 396 Words
    • 8 Pages

    Write a program in C/C++ to find the roots of a quadratic equation and perform the…

    • 396 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Abstract—Software testers are confronted with great challenges in testing Web Services (WS) especially when integrating to services owned by other vendors. They must deal with the diversity of implementation techniques used by the other services and to meet a wide range of test requirements. However, they are in lack of software artifacts, the means of control over test executions and observation on the internal behavior of the other services. An automated testing technique must be developed to be capable of testing on-the-fly nonintrusively and nondisruptively. Addressing these problems, this paper proposes a framework of collaborative testing in which test tasks are completed through the collaboration of various test services that are registered, discovered, and invoked at runtime using the ontology of software testing STOWS. The composition of test services is realized by using test brokers, which are also test services but specialized in the coordination of other test services. The ontology can be extended and updated through an ontology management service so that it can support a wide open range of test activities, methods, techniques, and types of software artifacts. The paper presents a prototype implementation of the framework in semantic WS and demonstrates the feasibility of the framework by running examples of building a testing tool as a test service, developing a service for test executions of a WS, and composing existing test services for more complicated testing tasks. Experimental evaluation of the framework has also demonstrated its scalability. Index Terms—Software engineering, software testing, distributed/internet based software engineering tools and techniques, testing tools, ontology, web services, semantic web services, service composition.…

    • 13378 Words
    • 54 Pages
    Good Essays
  • Satisfactory Essays

    Some research has focused on comparison of these algorithms in performance and speed of calculation…

    • 4284 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Business Plan for Hr Dept

    • 402 Words
    • 2 Pages

    m. Wish to establish a benchmark test on software, and train based on those results…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A. Pua, and Juan Paulo I. Torre" in partial fulfillment of the requirements for the Software…

    • 11243 Words
    • 81 Pages
    Satisfactory Essays

Related Topics