Cover image for How to break software security : effective techniques for security testing
Başlık:
How to break software security : effective techniques for security testing
Yazar:
Whittaker, James A., 1965-
ISBN:
9780321194336
Yayım Bilgisi:
Boston : Pearson/Addison Wesley, c2004.
Fiziksel Tanım:
xx, 185 p. ; 24 cm. + 1 CD-ROM (4 3/4 in.)
Contents:
A Fault Model for Software Security Testing -- Why Security Testing is Different -- A Fault Model for Security Vulnerabilities -- Security Concerns and the How to Break Software Fault Model -- Security and the User Interface -- Security and the File-System User -- Security and the Operating-System User -- Security and the Software User -- Security Inside the Software -- Creating an Attack Plan -- Attacking Software Dependencies -- User-Interface Attacks -- Attacking Design -- Attacking Implementation -- Creating Unanticipated Scenarios -- Attacking Software Dependencies -- Block access to libraries -- Manipulate the application's registry values -- Force the application to use corrupt files -- Manipulate and replace files that the application creates, reads from, writes to, or executes -- Force the application to operate in low memory, disk-space and network-availability conditions -- Summary of the Dependency Attacks: A Checklist for Battle -- Breaking Security Through the User Interface -- Overflow input buffers -- Examine all common switches and options -- Explore escape characters, character sets, and commands -- Summary of the User-Interface Attacks: A Checklist for Battle -- Design and Implementation Attacks -- Attacking Design -- Try common default and test account names and passwords -- Use Holodeck to expose unprotected test APIs -- Connect to all ports -- Fake the source of data -- Create loop conditions in any application that interprets script, code, or other user-supplied logic.
Abstract:
How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is released. Accompanying the book is a CD-ROM containing Holodeck, which tests for security vulnerabilities. There are also a number of bug-finding tools, freeware, and an easy-to-use port scanner included on the CD-ROM.
Added Author: