In previous article we seen about “Estimation Guidelines For Testing“. Today we are concentrating on What is Penetration Testing and sample test cases for Penetration Testing?
What is Penetration Testing?
“Penetration Testing is also known as Pen Testing. Pen testing is the practice of testing a web application, computer system, Network to find vulnerabilities that an attacker could exploit.”
It is practical and accredited method to measure the security of an IT infrastructure. By securely trying to exploit application susceptibilities which comprises of Operating system service and application blemishes, inappropriate configurations, and also perilous end-user behavior. This kind of evaluations are also helpful in authenticating the efficiency of defensive methods and also end-users’ adherence to security strategies.
Details about any security susceptibilities collected using Penetration testing need to be characteristically combined and presented network systems managers to perform remedial measures.
What Are The Possible Causes Of Vulnerabilities?
- Defects that might be caused during design and development phase
- Improper system configuration
- Human errors
Advantages Of Penetration Testing:
- Intelligently take care of susceptibilities
- Reduces the cost associated with network down time
- Meet regulatory requirements and curb fines
- Ability to maintain positive image of the company
- Assess network efficiency
- Upgrading existing infrastructure might lead to vulnerabilities which can be identified by pen testing.
Automation tools can possibly discern any standard vulnerabilities that are often present in a system. Pen Test tools can be exploited to validate security ambiguities which might be present in an application like data encryption techniques and hard coded values like username and password. At times, these tools may trigger a security issue even if there is no such issue originally.
Qualities Of A Penetration Tester:
- Select a suitable set of tools to balance cost and benefits.
- Adhere to suitable procedures by adopting proper planning and implementation.
- State potential risks and findings clearly in the final report and offer methods to mitigate risks.
- Keep oneself updated at all times.
Some Of The Popular Penetration Testing Tools Are:
- Acunetix:
Download here: Acunetix download - Back Track:
Download here: Back Track download - BeEF:
Download here: BeEF download - Burpsuite:
Download here: Burp suite download - CORE Impact:
Download here: CORE Impact download - Cain & Abel:
Download here: Cain & Abel download - Canvas:
Download here: Canvas download - Dradis:
Download here: Dradis download - John The Ripper:
Download here: John the Ripper download - Metasploit:
Download here: Metasploit Download - Nessus:
Download here: Nessus download - Netsparker:
Download here: Netsparker download - Nmap:
Download here: Nmap download - Retina:
Download here: Retina download - Social Engineer Toolkit:
Download here: SET download - Sqlninja:
Download here: Sqlninja download - Sqlmap:
Download here: Sqlmap download - Wireshark:
Download here: Wireshark download - w3af:
Download here: w3af download - Zed Attack Proxy (ZAP):
Download here: ZAP download
Penetration Testing Test Cases:
- Track data transmitted across wire
- Track data stored in file
- Check for secret password saved by programmer in a secret file
- Check if error page and condition expose any data which might help hacker
- Check if binary file consist of any sensitive information
- Check URL for sensitive data
- Check if internal server contain sensitive information
- Check if the application returns more data than it is needed
- Check for multi stage elevation
- Check for weak discretionary ACL
- Check for buffer overflow
- Attempt to modify execution flow for instance serial key validation
- Try to identify insecure function call for insecure methods
- Make an attempt to overflow protocol, server name, file name, query string and file extension
- Check for canonicalization attacks like using /,\ to access roots or may be like using environment variable to denote path
- Check for DOS attack strategies like changing expected data types, repeat same action over and again, attempt to connect to server concurrently
- Check for XML injection attack like crashing XML parser, Xquery injection and XML external entity attack
- Check for format string attack
- Check for spoofing attack like changing MAC address and IP address
- Check for HTML script injection attacks
- Check for COM and ActiveX attacks
- Check for code disassembling like performing algorithm reversing, analysis of security updates and patching binaries
Different Penetration Testing Types:
COM and ActiveX attacks
ActiveX controls are often triggered on the system when a person performs web browsing and installs specific applications like media player. They are often regarded as a method to stretch browser features to perform actions that browser cannot usually perform through HTML. Therefore, they need to be tested rigorously so other website cannot the controls.
- Check for SITELOCK
- Check for error Handling mechanism – Tester can identify potential defects that may reveal any relevant information
- Check for Overflows
Managed Code Vulnerability
Most of the applications these days still relies upon unmanaged code which is regarded as a serious threat.
- Check for UNSAFE block
- Check for APTCA assemblies.
- Check for Asserts- In most of the cases, an assert can be called using a partially trusted code.
HTML Script Injection attacks
This can occur in either of the two ways:
- Cross site scripting
- Persisted XSS (script injection)
Common scenarios that penetration tester should look into:
- Inject CR/LF – This is often regarded as an usual method which may result in HTTP content splitting attacks.
- Javascript:alert() or Vbscript:MsgBox()
Spoofing Attack
Targeting the system stealthily on behalf of a 3rd individual and the hacker maintaining one’s own identity safe is termed as spoofing attack. Hence, spoofing may result in a verdict which is grounded on false details.
Spoofing IP address- In this method IP address is altered to conceal the hacker’s identity
Change MAC address- In this method, the hacker alters the MAC address
Change SMTP message- Hacker can get hold of all email related information
Weak Permissions
- Application should be checked properly for time-to-time that permissions are granted only to the right persons.
- Check if there is too much access on files and resources- If any individual who does not have enough authorization is allowed to view the resources, it could seriously affect the security of the application.
- Check for multistage elevation- Hackers frequently chain numerous susceptibilities to get hold of upper level access.
Over to you:
Have you worked on Penetration Testing if yes then please share your experience in the below comment.
One like on Facebook or a Google + is really appreciated!
Recommended Penetration Testing Books:
- The Basics of Hacking and Penetration Testing
- Web Penetration Testing with Kali Linux
- Mastering Kali Linux for Advanced Penetration Testing
⇓ Subscribe Us ⇓
If you are not regular reader of this website then highly recommends you to Sign up for our free email newsletter!! Sign up just providing your email address below:
Happy Testing!!!
- 70+ Comprehensive Agile Project Management Tools List
- Installation and Configuration of Soap UI – Complete Guide
- Create Your First SoapUI Project – Step By Step Guide
- Working With Epics In JIRA – Tutorial 5
- Creating and Working on Sub-tasks in JIRA- Tutorial 9
- TestRail Test Management Tool – Hands on Review
- Guide on the Script Table in FitNesse with an example
- Tutorial #4: Getting Started with Mantis Bug Tracker
- Why Can Codeless Testing Tools Overcome the Barriers of Test Automation in 2020?
- Top 6 Open-Source and Free Tools For Mobile Testing For 2020
26 thoughts on “Penetration Testing – Sample Test Cases for Penetration Testing”
alert(‘xss’)
@Ram, @hacker – trying to apply Penetration test cases on our website…
alert(‘Thanks for sharing all tools details’)
The pen testing is one of my favorite type of testing. You presented information in very good manner with a huge list of useful tools. ###This is really appreciated and useful helpful for pen testers like me.
From above penetration testing tool list please distinguish the open source and paid tools. Also can you please recommend any tool?
thanks,
Hardcore Tester
alert(‘xss’)
Thanks for sharing penetration testing tools, nice to have such valuable list.
I am working in penetration testing from last 3 years and I really appreciated the points are covered in this article.
Many of the readers are aksing one common question is that which tool should we use for Pen-testing. If you compare windows and linux then linux has tons of tools for penetration testing as compared to windows. Use kali, bugtraq for linux.
I never worked on penetration testing however I am very much interested on pen-testing, so could you please share the sample application where I can execute the above list of test suites.
Thasks for sharing such a wonderful article.
hello friends, I am working on tesitng web site testing where I want to plan my pen-testing on same website application. Please let me know which tool is best to test the security feature of web app like login, session, cookies etc.
thanks stc, I am started learning Penetration testing using this article. Many things are cleared and getting good in depth knowledge from your article. thank you again.
You are doing this for Nobel cause. I am thanking you from all freshers for your efforts and doing very good job. Keep posting such nice articles.
I want to appear for ISTQB exam, could you please share the steps to apply for ISTQB certification exam?
Its very great to sharing valuable information for Pen-Testing. Really its very useful.
If I want to say all about article in one word then I can say “Superb…”
I am looking for good online testing courses for Penetration testing, please suggest the cources.
Thank you so much STC for this article. The test cases are very good and many more detailed level covered here.
The list of cases are nice and detailed and helpful for a tester like me.
thank you for posting such a useful content.
Thanks for the valuable information.
Excellent info, really appreciated your work.
Great Job !!!
Hi STC,
Simply great article. How you can manage to write such a clear and easy to understand articles, Thanks
Hi,
Do you have online courses on Penetration testing or etl testing.
Please share the details.
Thanks,
Jyoti
Beautiful cases, simple and really helpful.
thanks for valuable information
Thanks all who appreciated our efforts… It is not possible without valuable readers like you guys.