System security testing software list

With the popularity of Internet applications, software security is increasingly important, today I put together a list of software security testing, please take a closer look, see if there are omissions, and more to the force, to supplement in this thanked!

1. The security of the system and test methods

  1. Security software system
  2. Safety Codes and Standards System
  3. Source code review methods
  4. Risk-based Security Testing
  5. Permeability Test Method
  6. Fuzzing method

2. The code security testing

  1. Program code security
  2. C ++ / Java security list
  3. JavaScript Security List
  4. Code security scanning tools

3. Web security testing

  1. Dynamic tracking element attributes
  2. Check the JavaScript event
  3. Cross-site scripting attacks (XSS)
  4. Cross-site request forgery attack (CSRF)
  5. Denial of Service (DOS)
  6. Cookie hijacking
  7. Input validation
  8. Browser security issues
  9. File upload risk
  10. Web server security
  11. MSI IIS vulnerability test
  12. Apache / Tomcat / ... vulnerability test
  13. Content Security
  14. Session Management
  15. Intercept and modify the post request
  16. And examples of SQL injection
  17. AJAX security testing
  18. Multi-system single sign-on mechanism
  19. Web security penetration testing
  20. SQL injection vulnerability scanning tools
  21. Real-time observation using the request header Firebug
  22. Use Webscarab observation post real-time data
  23. Using real-time observation of the response header Tamperdata
  24. Using curl test URL redirection attacks
  25. Scan site using nikto

4. The security verifying system functionality

  1. Password Security
  2. Authentication
  3. User rights
  4. Unauthorized attack
  5. Access control policy
  6. Check the operation log
  7. Configuration Management
  8. Function failure, caused by abnormal security risk

The security verifying data

  1. Verification data encoding
  2. Data encryption and decryption
  3. System data integrity
  4. Data Manageability
  5. Data independence
  6. Data backup and disaster recovery

6. network and communications security test

  1. Protocol conformance verification
  2. Firewall
  3. Intrusion Detection Technology
  4. Network Interception
  5. IPSec/SSL VPN
  6. Fki / students
  7. Network Vulnerability Assessment Tool

Guess you like

Origin blog.csdn.net/weixin_43090420/article/details/92397711