请输入关键字
安全测试应用程序
Alin|2018-2-3

(5)Security testing for applications

Security testing techniques scour for vulnerabilities or security holes in applications.these vulnerabilities leave applications open to exploitation.Ideally,security testing is implemented throughout the entire software development life cycle(SDLC) so that vulnerabilities may be addressed in a timely and thorough manner.Unfortunately,testing is often conducted as an afterthought at the end of the development cycle.
Vulnerabilities scanners,and more specifically web application scanners,otherwise known as penetration testing tools (i.e.ethical hacking tools)have been historically used by security organizations within corporations and security consultants to automate the security testing of http request/responses;however,this is not a substitute for the need for actual source code review .Physical code reviews of an application's source code can be accomplished manually or in an automated fashion.Given the common size of individual programs (oftem 500K Lines of Code or more),the human brain can not execute a comprehensive data flow analysis needed in order to completely check all circuitous paths of an application program to find vulnerability points,The human brain is suited more for filtering,interrupting and reporting the outputs of automated source code analysis tools available commercially versus trying to race every possible path through a compiled code base to find the root cause level vulnerabilities.
The two types of autormated associated with application vulnerability detection (application vunlnerability scanners) and Source Code Analysis Tools(otherwise known as White Box Testing Tools).Tools in the Black Box Testing arena include Devfense,Watchfire,HP( though the acquisition of SPI Dynamics),Cenzic ,Nikto(open source),Grendel-Scan(open source).N-Stalker and Sandcat(freeware).Tools in the White Box Testing arena include Armorize Technologies,Fortify Software and Ounce Labs.

(5)安全测试应用程序

 

安全测试技术在应用程序中搜索漏洞或安全漏洞。这些漏洞使得应用程序可以被开发利用。理想情况下,安全测试是在整个软件开发生命周期(SDLC)中实现的,这样就可以及时、彻底地解决漏洞。不幸的是,测试通常是在开发周期结束时作为补充的。

漏洞扫描器,以及更具体的web应用程序扫描器,也称为渗透测试工具(即:伦理黑客工具)在公司和安全咨询公司的安全组织中一直被用于自动化http请求/响应的安全测试;然而,这并不能代替实际的源代码审查。应用程序源代码的物理代码审查可以手工完成,也可以以自动化的方式完成。鉴于个人项目的常见的大小(经常500 k行代码或更多),人类的大脑不能执行一个全面的数据流分析需要为了完全检查应用程序的所有迂回的路径找到漏洞点,人类的大脑是适合更多的过滤、中断和报告的输出自动源代码分析工具可用的商业和试图比赛每一个可能的路径通过编译代码库找到漏洞的根本原因水平。

与应用程序漏洞检测(应用程序vunlner承受力扫描器)和源代码分析工具(或称为白盒测试工具)相关的两种类型的自动交配。黑盒测试领域的工具包括Devfense、Watchfire、惠普(尽管收购了SPI动态)、Cenzic、Cenzic(开源)、grendel-scan(开源)。N-Stalker和Sandcat(免费)。在白盒测试领域的工具包括arm化技术、强化软件和盎司实验室。

 
 
赞一下18||已浏览1429

本站版本归木之林解释所有 copyright(C)2010-2025www.mzlin.net 备案/许可证编号为:粤ICP备15050036号