当前位置:网站首页>Safety testing aspects
Safety testing aspects
2022-07-04 10:49:00 【weixin_ thirty-four million three hundred and twenty-two thousa】
What are the three elements of information security ?
confidentiality (Confidentiality)、 integrity (Integrity) And usability (Availability) It is the three cornerstones of information security .
1) confidentiality : Ensure that information is not disclosed to unauthorized users .
2) integrity : Ensure that the message is transmitted from the real sender to the real recipient , It has not been added by illegal users in the process of transmission 、 Delete 、 Replacement, etc .
3) Usability : Ensure that authorized users can access data timely and reliably .
except CIA Outside , There are also some attributes that are required to be achieved , Such as controllability (Controllability) And non repudiation (Non-Repudiation). But the three elements of information security are confidentiality 、 Integrity and availability , Can't change
What is decompilation :
Computer software reverse engineering (Reverse engineering) Also known as computer software restore engineering , It refers to the target program through the software of others ( For example, executable programs ) Conduct “ Reverse analysis 、 Research ” Work , To deduce the ideas used by other people's software products 、 principle 、 structure 、 Algorithm 、 Treatment process 、 Design elements such as operation method , In some specific cases, the source code may be derived . Decompile as a reference when developing software , Or directly used in their own software products
Mobile decompiler :【APKTool】【jadx】
【APKTool】
apktool It's mainly used in reverse apk file . It can decode resources , And they can be rebuilt after modification . It can also perform some automated tasks , For example, build apk
apktool function :
1) Decode the resource into its original form ( Include resources.arsc,class.dex,9.png and xml)
2) Repackage the decoded resources into apk/jar
3) Organize and deal with projects that depend on framework resources APK
4)Smali debugging
5) Perform automated tasks
【jadx】
jadx It is a reverse APK File tool , Sometimes we need to analyze the mobile terminal penetration test personnel APK File source code to view APK The logic of the file and finding relevant sensitive information , And that's where we need to use it jadx decompile
The difference between penetration test and safety test :
1. Starting point difference
Penetration test -》 So the successful intrusion system , The starting point is to prove that the system has security problems 【 prove 】
Security testing -》 Therefore, it is not the starting point to find all possible security risks of the system 【 Find out 】
2. Visual differences
Penetration test -》 It is to look at and think about problems from the perspective of attackers
Security testing -》 It is to think from the perspective of guardians , Try to find all potential security risks that may be exploited by attackers , And guide them to repair
3. Coverage differences
Penetration test -》 Only select a few points as the test target
Security testing -》 It is a complete test after analyzing the system architecture and finding out all possible attack interfaces of the system
4. Cost differences
Penetration test -》 The investment of time and manpower is relatively small
Security testing -》 The function of the system is required 、 Analyze the technology adopted by the system and the architecture of the system , Need to invest more time and manpower
5. Solution differences
Penetration test -》 Unable to provide targeted solutions
Security testing -》 I will analyze the causes of problems from the perspective of developers , Provide more effective solutions
边栏推荐
- Performance test overview
- Rhcsa day 9
- [Galaxy Kirin V10] [server] iSCSI deployment
- Dynamic memory management
- Seven examples to understand the storage rules of shaped data on each bit
- The last month before a game goes online
- Get the data of the top 100 headlines today with Tianxing data
- /*Write a function to open the file for input, read the contents of the file into the vector container of string class 8.9: type, and store each line as an element of the container object*/
- leetcode1229. Schedule the meeting
- C language structure to realize simple address book
猜你喜欢
[Galaxy Kirin V10] [desktop] can't be started or the screen is black
VI text editor and user rights management, group management and time management
Huge number (C language)
2022 AAAI fellow release! Yan Shuicheng, chief scientist of sail, and Feng Yan, Professor of Hong Kong University of science and technology, were selected
Network connection (III) functions and similarities and differences of hubs, switches and routers, routing tables and tables in switches, why do you need address translation and packet filtering?
183 sets of free resume templates to help everyone find a good job
Remove linked list elements
[Galaxy Kirin V10] [server] FTP introduction and common scenario construction
Quick sort (C language)
JMeter Foundation
随机推荐
Latex learning insertion number - list of filled dots, bars, numbers
2022 AAAI fellow release! Yan Shuicheng, chief scientist of sail, and Feng Yan, Professor of Hong Kong University of science and technology, were selected
Rhcsa operation
Jemeter script recording
Tables in the thesis of latex learning
[Galaxy Kirin V10] [desktop] build NFS to realize disk sharing
Pod management
RHCE - day one
Evolution from monomer architecture to microservice architecture
Map container
DDL statement of MySQL Foundation
JMeter correlation technology
Huge number multiplication (C language)
Network connection (II) three handshakes, four waves, socket essence, packaging of network packets, TCP header, IP header, ACK confirmation, sliding window, results of network packets, working mode of
[Galaxy Kirin V10] [server] KVM create Bridge
51 data analysis post
Jianzhi offer 04 (implemented in C language)
Advanced order of function
Realsense d435 d435i d415 depth camera obtains RGB map, left and right infrared camera map, depth map and IMU data under ROS
RHCE day 3