SlideShare a Scribd company logo
Step-By-Step
Approach for
Web
Application
Security
Testing
Due to recent
advancements in
information technology, it
has become possible for
one to gain unauthorized
access to confidential
information about web
applications. It has thus
become important for
companies to employ web
application security
services.
Here is an
approach
for testing
web
applications
for security
Cracking Password
Cracking password is the first step implemented
by a website application security testing services
company. One can log in to the private modules
of an application either by guessing user name
and password correctly, or by utilizing a
password cracker tool. Along with open source
password cracker tools, you will get a list of
common passwords and user names. Cracking
the password normally does not take a long time
unless the password involves a complex
combination of alphabets, numbers and special
characters. Sometimes cookies store
information about user names and passwords. It
is possible to steal these cookies and extract
these pieces of information from them.
Manipulating
URL
When an application uses HTTP GET method
for the exchange of information between client
and server, some important information is
passed to the query string through
parameters. It is the responsibility of a tester
to analyze the information in query string. This
can be done by changing a parameter in
query string and checking if it is accepted by
the server. Server receives user information
via HTTP GET request, and authenticates it.
Information can be extracted from GET
request by manipulating its variables. An
attacker can observe unusual behavior in the
application and exploit it. This risk can be
eliminated by employing reliable website
application security services.
Checking For SQL Injection
Checking for SQL injection is an important stage in web
application security testing. Normally an application rejects the
entry of a single quote in a text box. However, such queries
sometimes get processed by the application, causing a
database error. This indicates the possibility of an SQL injection.
Checking For SQL Injection
SQL injection attacks should never be ignored as one can
gain access to confidential information with the help of
these attacks. Entry points of injection can be figured out
by analyzing the code base. User inputs given in the form
of MySQL queries are stored in code base
Content Source
http://www.avyaan.com/blog/step-by-step-approach-for-
web-application-security-testing/
A-83, 1st Floor, Sector-2, Noida
201301 India

More Related Content

PPTX
Security testing
PDF
Security testing presentation
PPT
Introduction to Web Application Penetration Testing
PDF
The Complete Web Application Security Testing Checklist
PPT
Get Ready for Web Application Security Testing
PPTX
Web application vulnerability assessment
PPTX
Security Testing Training With Examples
PDF
Web application security & Testing
Security testing
Security testing presentation
Introduction to Web Application Penetration Testing
The Complete Web Application Security Testing Checklist
Get Ready for Web Application Security Testing
Web application vulnerability assessment
Security Testing Training With Examples
Web application security & Testing

What's hot (20)

PDF
Web Application Security 101 - 04 Testing Methodology
PDF
Testing Web Application Security
PPTX
Owasp first5 presentation
PPTX
Security Testing for Web Application
PDF
Introduction to Security Testing
PPTX
A7 Missing Function Level Access Control
PPT
Web Application Security
PPS
Security testing
PDF
Web Application Security 101
PPTX
Web application security: Threats & Countermeasures
PDF
Security-testing presentation
PPT
Web Application Security Testing
PPTX
Security Testing
PPTX
Web Application Penetration Testing Introduction
PPTX
Owasp top 10 2017
PDF
Owasp top 10
PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
PPTX
Penetration Testing
PDF
Axoss Web Application Penetration Testing Services
PPTX
A10 - Unvalidated Redirects and Forwards
Web Application Security 101 - 04 Testing Methodology
Testing Web Application Security
Owasp first5 presentation
Security Testing for Web Application
Introduction to Security Testing
A7 Missing Function Level Access Control
Web Application Security
Security testing
Web Application Security 101
Web application security: Threats & Countermeasures
Security-testing presentation
Web Application Security Testing
Security Testing
Web Application Penetration Testing Introduction
Owasp top 10 2017
Owasp top 10
OWASP Top 10 - 2017 Top 10 web application security risks
Penetration Testing
Axoss Web Application Penetration Testing Services
A10 - Unvalidated Redirects and Forwards
Ad

Similar to Step by step guide for web application security testing (20)

PDF
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
PDF
C01461422
PDF
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
PDF
Prevention of SQL injection in E- Commerce
PDF
Session3 data-validation-sql injection
PDF
International Journal of Engineering Inventions (IJEI)
PPSX
Session3 data-validation
PDF
Ld3420072014
PPTX
Application Security 101 (OWASP DC)
PPTX
Core defense mechanisms against security attacks on web applications
PPTX
SQL INJECTION ATTACKS.pptx
PDF
76 s201923
DOCX
Demand for Penetration Testing Services.docx
PDF
Ijeee 51-57-preventing sql injection attacks in web application
PDF
The International Journal of Engineering and Science (The IJES)
PDF
Web Application Penetration Testing Course in 2025.pdf
PPTX
SCWCD : Secure web
PPTX
SCWCD : Secure web : CHAP : 7
PDF
IRJET - SQL Injection: Attack & Mitigation
PDF
Security Testing In Application Authentication
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
C01461422
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Prevention of SQL injection in E- Commerce
Session3 data-validation-sql injection
International Journal of Engineering Inventions (IJEI)
Session3 data-validation
Ld3420072014
Application Security 101 (OWASP DC)
Core defense mechanisms against security attacks on web applications
SQL INJECTION ATTACKS.pptx
76 s201923
Demand for Penetration Testing Services.docx
Ijeee 51-57-preventing sql injection attacks in web application
The International Journal of Engineering and Science (The IJES)
Web Application Penetration Testing Course in 2025.pdf
SCWCD : Secure web
SCWCD : Secure web : CHAP : 7
IRJET - SQL Injection: Attack & Mitigation
Security Testing In Application Authentication
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
SOPHOS-XG Firewall Administrator PPT.pptx
Spectroscopy.pptx food analysis technology
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Getting Started with Data Integration: FME Form 101
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx

Step by step guide for web application security testing

  • 2. Due to recent advancements in information technology, it has become possible for one to gain unauthorized access to confidential information about web applications. It has thus become important for companies to employ web application security services. Here is an approach for testing web applications for security
  • 3. Cracking Password Cracking password is the first step implemented by a website application security testing services company. One can log in to the private modules of an application either by guessing user name and password correctly, or by utilizing a password cracker tool. Along with open source password cracker tools, you will get a list of common passwords and user names. Cracking the password normally does not take a long time unless the password involves a complex combination of alphabets, numbers and special characters. Sometimes cookies store information about user names and passwords. It is possible to steal these cookies and extract these pieces of information from them.
  • 4. Manipulating URL When an application uses HTTP GET method for the exchange of information between client and server, some important information is passed to the query string through parameters. It is the responsibility of a tester to analyze the information in query string. This can be done by changing a parameter in query string and checking if it is accepted by the server. Server receives user information via HTTP GET request, and authenticates it. Information can be extracted from GET request by manipulating its variables. An attacker can observe unusual behavior in the application and exploit it. This risk can be eliminated by employing reliable website application security services.
  • 5. Checking For SQL Injection Checking for SQL injection is an important stage in web application security testing. Normally an application rejects the entry of a single quote in a text box. However, such queries sometimes get processed by the application, causing a database error. This indicates the possibility of an SQL injection.
  • 6. Checking For SQL Injection SQL injection attacks should never be ignored as one can gain access to confidential information with the help of these attacks. Entry points of injection can be figured out by analyzing the code base. User inputs given in the form of MySQL queries are stored in code base