Skip to main content

Dynamic Application security testing

 


Dynamic Application Security Testing (DAST)

DAST is also a very crucial application security testing procedure. It works in a way that can investigate applications while they are running to detect security vulnerabilities. It is a fact that the vulnerabilities and threats are growing at a rapid scale and this is the only reason why businesses consider deploying DAST.

Why is it necessary?

Now, though web applications suffer attacks as a major threat, these aren’t as deadly as ransomware. The most common way that web applications have security issues is via SQL injection.

The next common way hackers use to take advantage of the vulnerabilities is cross-site scripting. The hackers inject their codes in the web applications through which they steal confidential data, cookies, and credentials.

There are two different types of DAST testing. They are:

  • 🕳  Automated DAST

DAST scanners are mostly activated by crawlers. Such crawlers use bots to scan through websites automatically and logs every page of the application. Further, the security testing setup audits the entire web application for any possible vulnerability. This audit even includes checking for brute force attacks too.

Now, such an automated DAST can detect many different kinds of vulnerabilities. 

  • 🕳  Manual DAST

Automated DAST and or SAST are good for regular security checks. But context-based business logic vulnerabilities requires human intervention.

The tester has understood the context of the application and then create test cases to change the response manually that is exchanged between the browser and the server. This opens up a huge prospect of exploring all the vulnerabilities and working on mitigating them.

🕳  Static Application security testing 

Comments

Popular posts from this blog

SQL Injection Types.

SQL Injection Types: There are various types of SQL Injection. We will consider a few of them below. 1.) Union-based SQL Injection: With the help of the union operators, we can combine the results of two or more SELECT statements to a single output. The return of this single output is a part of the  HTTP response . We can use it to extract data from other tables as well. Example: ‘ AND ‘a’=’b’ UNION SELECT 101, ‘abc’, ‘xyz’ FROM members WHERE ‘a’=’a The  single quote  at the start specifies the end of the original query. The first query must set to  FALSE , hence we specify the condition as ‘a’=’b’ after  AND  function. Both queries that are before and after  UNION  must have the same structure otherwise it will generate an error. It will generate the SQL query after getting the input from the user as: SELECT id, name, description FROM products WHERE category = ” AND ‘a’=’b’ UNION SELECT 101, ‘abc’, ‘xyz’ FROM members WHERE ‘a’=’a’ So it will retu...

What is applications security testing ?

 What is Application Security Testing? The term security testing refers to the software testing category that helps to uncover: Risks associated with the software applicationContinuous security threatsPossible vulnerabilities Added to this, web application security testing also prevents malicious cyber-attacks and threats coming from intruders. The main working behind the application security testing is to recognize the digital and software system related weaknesses and every possible loophole that can cause significant damages to the concerned business, like: Loss of reputationLoss of dataLoss of revenue The central ideology behind web app security is to recognize the different types of threats present in your system following its potential vulnerabilities. After identifying those, the application security testing uses various security aspects to prevent your order from being exploited or inappropriately cease to function. The web application security testing also acts as a digita...

What is SEEKER

seeker - Accurately Locate Smartphones using Social Engineering .   Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites. Read more on thewhiteh4t's Blog .Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location Permission and if the target allows it, we can get : ⭕️Longitude ⭕️Latitude ⭕️Accuracy ⭕️Altitude - Not always available ⭕️Direction - Only available if user is moving ⭕️Speed - Only available if user is moving Along with Location Information we also get Device Information without any permissions : ⭕️Operating System ⭕️Platform ⭕️Number of CPU Cores ⭕️Amount of RAM - Approximate Results ⭕️Screen Resolution ⭕️GPU information ⭕️Browser Name and Version ⭕️Public IP Address ⭕️IP Address Reconnaissance This tool is a Proof of Concept and is for Educational Purpose...