Hi Community, I would like to know how the security testing is performed and Is there any tools which
is used to scan the code and identify the vulnerabilities in the code.
Hi Community, I would like to know how the security testing is performed and Is there any tools which
is used to scan the code and identify the vulnerabilities in the code.
Various ways, but think of it largely as performed by pointing tools at the System Under Test. The tools will have a wide range of selectable attack surfaces known to scan for which you can select.
Attack surfaces could include for example:
The hard part isn’t so much using these tools which do most of the stuff for you, it’s investigating the results & writing an end vulnerability findings report. For that you need really expert security testing members who are highly trained & experienced. It’s really not an easy role & like general network security, these members need to be constantly informed, constantly learning of new threats.
There are another set of tools for the code which can be used by developers and/or security testers. If you search the web for “security scan code” or “static code analysis”, you’ll be able to find a few of these which are often run in the IDE
As Alex mentioned, there are many tools for security testing. If we would be speaking about secure development, what usually comes to mind are two terms - SAST, andDAST. Each one of them is used in different cases and has it’s ups and downs. In the best case scenario, we would love to use both of them since that would give us the most accurate view of the current threat landscape.
SAST is the example of white-box testing as you have to have the access to the source code. DAST on the other hand represents the black-box testing as it is trying to test the running application.
There are some free and paid versions with each tool having it’s ups and downs. I won’t be naming the exact tools but if you look for the “TOP10” you should be able to find them easily.
There are also IAST, RASP and much more, but we can stick to these two for the majority of businesses. :)
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.