Thursday, October 31, 2019

web applications pen Testing and samurai framework for web applications testing

https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm (step by step procedure on manual testing and automated pen testing)
 Penetration testers knowledge and expertise: 
Black hat attack methodologies (e.g., remote access attacks, SQL injection)
Internal and external testing (i.e., perspective of someone within the network, perspective of hacker over Internet)
Web front-end technologies (e.g.,Javascript, HTML)
Web application programming languages (e.g., Python, PHP)
Web APIs (e.g., restful, SOAP)
Network technologies (e.g, firewalls, IDS)
Networking protocols (e.g., TCP/UDP, SSL)
Operating systems (e.g., Linux, Windows)
Scripting languages (e.g., python, pearl)
Testing tools (e.g., Nessus, Metasploit)
In short, penetration testers provide a deep look into the data security of an organization.
https://www.netsparker.com/blog/web-security/getting-started-web-application-security/
https://searchsecurity.techtarget.com/tip/5-step-checklist-for-web-application-security-testing
https://www.tutorialspoint.com/penetration_testing/penetration_testing_quick_guide.htm
https://www.guru99.com/web-application-testing.html
http://www.internet-computer-security.com/VPN-Guide/SSL-VPN.html
https://sectools.org/tool/samurai/
https://www.apriorit.com/dev-blog/622-qa-web-application-pen-testing-owasp-checklist

What are the Skill-Sets of Ethical Hackers?
Expert ethical hackers have the following skill-sets to hack the system ethically

What do Ethical Hackers do?
Ethical hackers (while performing penetration testing) basically try to find the answers to the following questions −


Moreover, an ethical hacker is required to address adequately the vulnerabilities and risks, which he found to exist in the target system(s). He needs to explain and suggest the avoidance procedures. Finally, prepare a final report of his all ethical activities that he did and observed while performing penetration testing.

SSL VPN (Secure Socket Layer VPN)

Thursday, October 24, 2019

session tokens, cookies and networking

https://www.enisa.europa.eu/events
https://www.first.org/cvss/calculator/3.0 (CVSS calculator)
https://tools.cisco.com/security/center/cvssCalculator.x (online CVSS calculator - interactive)
https://www.first.org/cvss/specification-document#3-1-Exploit-Code-Maturity-E (CVSS 3.1 guide)
https://www.recordedfuture.com/cvss-scores-guide/ (CVSS score guides)
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator (CVSS score  calculation procedure)
https://rhinosecuritylabs.com/landing/network-penetration-test-report/ 
https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-sticky-sessions.html
https://www.tecmint.com/tcpflow-analyze-debug-network-traffic-in-linux/
https://searchnetworking.techtarget.com/answer/How-to-interpret-test-scan-results-to-assess-network-vulnerability
https://www.us-cert.gov/ncas/analysis-reports/AR19-100A
https://security.berkeley.edu/faq/nessus-network-vulnerability-scanning
https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture29.pdf

Hackers club tools
https://hackersonlineclub.com/vapt-tools/
https://hacken.io/research/education/how-much-does-penetration-test-cost-or-price-of-your-security/ (cost of pen test analysis)
https://searchsecurity.techtarget.com/feature/Choose-the-best-vulnerability-assessment-tools
https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/vulnerabilities-and-exploits (Vulnerables repository)
https://www.exploit-db.com/ (oldest vulnerables repository)
https://snyk.io/vuln (existing vulnerabilities repository database)

Amazon Web Services(aws)
https://www.andreafortuna.org/2018/07/18/tcpdump-a-simple-cheatsheet/
https://virginia.service-now.com/its?id=itsweb_kb_article&sys_id=75e70054dbb553404f32fb671d9619d5 Plugin are similar to virus information

Nessus security centre (Tenable.sc) tool
https://www.tenable.com/sc-report-templates/tcp-metrics-report
https://gf.dev/website-audit  (website testing)
https://www.bonkersabouttech.com/security/40-plus-list-of-intentionally-vulnerable-websites-to-practice-your-hacking-skills/392 (vulnerable sites to practice)
(windows 10 64bit .iso iage to download) https://zillowtech.com/download-windows-10-iso.html
https://www.technewsworld.com/story/54411.html 

Monday, October 21, 2019