Claims
- 1. A method of security testing a web application comprising:
identifying a web application to be tested; identifying potential security vulnerabilities of the web application; generating a security test for testing at least one of said potential vulnerabilities; executing said security test on said web application; and analyzing results of said executing said security test.
- 2. The method of claim 1 further comprising using the results of said executing said security test to improve security of said web application.
- 3. The method of claim 1 wherein said identifying potential security vulnerabilities includes analyzing a path through the web application.
- 4. The method of claim 1 wherein said web application comprises one or more web pages.
- 5. The method of claim 1 wherein said potential security vulnerabilities include at least one vulnerability selected from the group comprising session management vulnerability, authentication/access control vulnerability, input validation vulnerability, parameter tampering vulnerability, hidden parameter manipulation vulnerability, script tampering vulnerability, and file/application enumeration vulnerability.
- 6. The method of claim 5 wherein said session management vulnerability comprises at least one of simple session ID generation, non-expiration of session IDs, protection of session data, and cookie manipulation.
- 7. The method of claim 5 wherein said authentication/access control vulnerability comprises at least one of default accounts/passwords, default scripts, and debug options on scripts.
- 8. The method of claim 5 wherein said input validation vulnerability comprises buffer overflow.
- 9. The method of claim 5 wherein said parameter tampering vulnerability comprises at least one of reordering parameters, deleting parameters and adding parameters.
- 10. The method of claim 5 wherein said hidden parameter manipulation vulnerability comprises at least one of changing parameters, manipulating parameters, and manipulating Java Script parameters.
- 11. The method of claim 5 wherein said script tampering vulnerability comprises at least one of script corruption and cross-site scripting.
- 12. The method of claim 5 wherein said file/application enumeration vulnerability comprises at least one of directory indexing, access/control faults, mirror directories, backup files, common files and web travel.
- 13. A computer program product comprising a computer usable medium having computer readable code thereon for security testing of a web application comprising:
instructions for identifying a web application to be tested; instructions for identifying potential security vulnerabilities of the web application; instructions for generating a security test for testing at least one of said potential vulnerabilities; instructions for executing said security test on said web application; and instructions for analyzing results of said executing said security test.
- 14. The computer program product of claim 13 further comprising instructions for using the results of said executing said security test to improve security of said web application.
- 15. The computer program product of claim 13 wherein said instructions for identifying potential security vulnerabilities includes instructions for analyzing a path through the web application.
- 16. The computer program product of claim 13 wherein said web application comprises one or more web pages.
- 17. The computer program product of claim 13 wherein said instructions for identifying potential security vulnerabilities include instructions for identifying at least one vulnerability selected from the group comprising session management vulnerability, authentication/access control vulnerability, input validation vulnerability, parameter tampering vulnerability, hidden parameter manipulation vulnerability, script tampering vulnerability, and file/application enumeration vulnerability.
- 18. The computer program product of claim 17 wherein said session management vulnerability comprises at least one of simple session ID generation, non-expiration of session IDs, protection of session data, and cookie manipulation.
- 19. The computer program product of claim 17 wherein said authentication/access control vulnerability comprises at least one of default accounts/passwords, default scripts, and debug options on scripts.
- 20. The computer program product of claim 17 wherein said input validation vulnerability comprises buffer overflow.
- 21. The computer program product of claim 13 wherein said parameter tampering vulnerability comprises at least one of reordering parameters, deleting parameters and adding parameters.
- 22. The computer program product of claim 13 wherein said hidden parameter manipulation vulnerability comprises at least one of changing parameters, manipulating parameters, and manipulating Java Script parameters.
- 23. The computer program product of claim 13 wherein said script tampering vulnerability comprises at least one of script corruption and cross-site scripting.
- 24. The computer program product of claim 13 wherein said file/application enumeration vulnerability comprises at least one of directory indexing, access/control faults, mirror directories, backup files, common files and web travel.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority under 35 U.S.C. §119 (e) to provisional application serial No. 60/355,186 filed Feb. 7, 2002, and to provisional application serial No. 60/397,524 filed Jul. 22, 2002 the disclosures of which are hereby incorporated by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60355186 |
Feb 2002 |
US |
|
60397524 |
Jul 2002 |
US |