Saturday, June 29, 2013

Test Cases for Security Testing


1. Try to directly access bookmarked web page without login to the system.
2. Verify that system should restrict you to download the file without sign in on the system.
3. Verify that previous accessed pages should not accessible after log out i.e. Sign out and then press the Back button to access the page accessed before.
4. Check the valid and invalid passwords, password rules say cannot be less than 6 characters, user id and password cannot be the same etc.
5. Verified that important i.e. sensitive information such as passwords, ID numbers, credit card numbers, etc should not get displayed in the input box when typing. They should be encrypted and in asterix format.
6 .Check Is bookmarking disabled on secure pages? Bookmarking Should be disabled on secure pages.
7. Check Is Right Click, View, Source disabled? Source code should not be visible to user.
8. Is there an alternative way to access secure pages for browsers under version 3.0, since SSL is not compatible with those browsers?
9. Check does your server lock out an individual who has tried to access your site multiple times with invalid login/password information?
10. Verify the timeout condition, after timeout user should not able to navigate through the site.
11. Check Are you prevented from doing direct searches by editing content in the URL?
12. Verify that relevant information should be written to the log files and that information should be traceable.
13. In SSL verify that the encryption is done correctly and check the integrity of the information.
14. Verify that restricted page should not be accessible by user after session time out.
15. ID / password authentication, the same account on different machines cannot log on at the same time. So at a time only one user can login to the system with a user id.
16. ID / password authentication methods entered the wrong password several times and check if the account gets locked.
17. Add or modify important information (passwords, ID numbers, credit card number, etc.). Check if it gets reflected immediately or caching the old values.

  1. Verify that Error Message does not contain malicious info so that hacker will use this information to hack web site.

Monday, June 24, 2013

Waterfall Model

Waterfall model was meant to function in a systematic way that takes the production of the software from the basic step going downwards towards detailing just like a Waterfall which begins at the top of the cliff and goes downwards but not backwards.



Different Phases of Waterfall Model:

Definition Study / Analysis: During this phase research is being conducted which includes brainstorming about the software, what it is going to be and what purpose is it going to fulfill.

Basic Design: If the first phase gets successfully completed and a well thought out plan for the software development has been laid then the next step involves formulating the basic design of the software on paper.

Technical Design / Detail Design:  After the basic design gets approved, then a more elaborated technical design can be planned. Here the functions of each of the part are decided and the engineering units are placed for example modules, programs etc.

Construction / Implementation: In this phase the source code of the programs is written.Testing: At this phase, the whole design and its construction is put under a test to check its functionality. If there are any errors then they will surface at this point of the process.

Integration: in the phase of Integration, the company puts it in use after the system has been successfully tested.Management and Maintenance: Maintenance and management is needed to ensure that the system will continue to perform as desired.

Advantages of Waterfall Model:
  • Waterfall model is simple to implement and also the amount of resources required for it are minimal.
  • This methodology is preferred in projects where quality is more important as compared to schedule or cost.
  • Documentation is produced at every stage of the software’s development. This makes understanding the product designing procedure, simpler.
  • After every major stage of software coding, testing is done to check the correct running of the code.
 Disadvantages of Waterfall Iterative Model:
  •  Real projects rarely follow the sequential flow and iterations in this model are handled indirectly. These changes can cause confusion as the project proceeds.
  •  In this model we freeze software and hardware. But as technology changes at a rapid pace, such freezing is not advisable especially in long-term projects.
  • Even a small change in any previous stage can cause big problem for subsequent phases as all phases are dependent on each-other.
  • Going back a phase or two can be a costly affair.