A Security Testing Report You are required to write a penetration test report. This report (2000 words) focuses on the technical aspects of web application vulnerabilities. In this pen-test report,...

1 answer below »

A Security Testing Report



You are required to write a penetration test report. This report (2000 words) focuses on the technical aspects of web application vulnerabilities. In this pen-test report, you will need to demonstrate at least 3 vulnerabilities in the OWASP top 10 list (2017 version). You may use any vulnerable web applications or web sites included in the ethical hacking environment that we set up in course 3, that is, the OWASP broken web application box.



This report should include the following sections:


1.
Executive summary. Executive summaries should cover what led up to the issue being addressed, the problematic situation, and proposed solution with expected results. Executive reports do not require technical details and should target leadership rather than technical staff.(You may find hints on writing good executive summaries from http://unilearning.uow.edu.au/report/4bi1.html.)


2.
Methodology. This section includes an overview of how you deliver services. Highlights should include your process for each phase of an engagement, tools used, and how you handle identified threats.


3.
Detailed Testing Procedures. This section covers technical details. The target audience is typically the technical staff, and the goal is to provide as much information as possible around identified issues of concern. Typically, subjects to include are targets discovery, mapping, vulnerability assessment, architecture analysis, exploiting, and reporting.


4.
Vulnerabilities. Vulnerabilities found should include a clear description about the source of the weakness, impact to business operations and likelihood of being exploited. If time and resources permit, each instance of vulnerability should be manually verified together with the results obtained from the scanners. Some details that could be included for identified vulnerabilities include 1) Vulnerability name, 2) Vulnerability description, 3) Technical details.


Reference list.
Answered Same DayMay 16, 2021SIT704Deakin University

Answer To: A Security Testing Report You are required to write a penetration test report. This report (2000...

Amit answered on May 20 2021
141 Votes
Title of the assignment:
Student’s name:
Professor’s name:
Course title:
Date:
Table of Contents
1.    Executive summary    3
2.    Methodology    4
3.    Detailed testing procedures    8
4.    Vulnerabilities    9
5.    References:    11
1. Executive summary
The safety of web applications considers different factors and follows different guidelines defining their technical aspects. The OWASP is a global group which combines different organizations and defines
the common guidelines as the documentation to maintain the security of web applications. The apparatus used for maintaining web security places important role for all web service based organizations. The OWASP was established by Mr. Mark in 2001 and this organization is continuously providing services to maintain the security of web applications. This organization is nonprofit organization and provides required directions to maintain the security. The OWSAP provides a detailed list of possible identified risks and threats to the web applications after each specific time period. The methods to remedies the identified new risks and threats to web applications are also suggested by this organization. There are so many possible vulnerabilities to the web applications so; here I have selected exposure of confidential databases, different injections and unauthorized access to the web applications. The web applications faces different vulnerabilities because of these selected vulnerabilities types. The accountability losses to web applications, data losses, failure of web system, access denied to the primary users of web applications, and system breakdown are the mainly occurred vulnerabilities from the identified and selected vulnerabilities. The advance controls of SQL and setting the LIMIT of any access can prevent these identified vulnerabilities [Deepa & Thilagam, 2016]. The special character based syntax and processes can also reduce the chances of possible vulnerabilities to web applications. In my report I will explain the methodology and testing procedures for removing the possible vulnerabilities from the web applications. The identifications and testing of possible vulnerabilities provides effective measures to web applications for removing them. The followed testing procedures and methodologies will help in maintaining the web security of such applications.
2. Methodology
The modern world is based on computer applications and web services are providing global connectivity, so, chances of threats and vulnerabilities to web applications becomes high. The threats can exploit the working of complete web application, so these unauthorized actions must be prevented for maintaining required flow of activities in web applications. For causing any vulnerability and threat to web application, the attackers finds the week point of that application to create possible attack. So, if the web application using organizations and developers identifies the vulnerabilities on initial bases with applying different methodologies and testing procedures, then, it will be beneficial. The recurring process of managing the threats is followed which includes [Amit & Tripp, 2015]:
1. Identification of vulnerability,
2. Classification of vulnerability,
3. Remediation of vulnerability,
4. Finally mitigation.
The computer systems make use of above presented methodology for identification of vulnerabilities in any web application. The same methodology is followed for identification of threats in any web application. The anomaly losses can be caused by vulnerabilities to web applications. The security risks to web applications can cause significant impact on the overall performance. Some vulnerability can easily be identified and removed by following the set methodologies. The organizations developing and using web applications also develop security software which can easily rid the vulnerabilities. The excuses of EAS provide architecture for help the web applications to recover from the vulnerabilities and maintaining their process flow. The application stakeholders are mainly targeted by the attackers for causing huge potential damages. The execution and implementation of the web applications is mainly managed by the stakeholders and if any potential losses are caused to them, then, failure of complete web application is also possible. The vulnerabilities to web applications can change the credentials of valid input, system logging and can also cause errors related to operational...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here