当前位置:网站首页>Do you know the difference between safety test, functional test and penetration test?
Do you know the difference between safety test, functional test and penetration test?
2022-07-26 19:33:00 【Software testing】
One 、 Basic understanding
When will the safety test begin ?
Security testing is in IT In the life cycle of software products , In particular, product development is basically completed to the release stage , The process of product inspection to verify that the product meets the safety requirements definition and product quality standards .
The difference between safety test and functional test :
1. Different goals : Test to find BUG Target , The goal of safety testing is to find potential safety hazards .
2. Different assumptions : The data that causes problems in testing assumptions is caused by users' carelessness , Interfaces generally only consider the user interface . The security test assumes that the data causing the problem is deliberately constructed by the attacker , All possible attack routes need to be considered .
3. Different thinking areas : The test takes the function of the system as the thinking field . The thinking area of security testing includes not only the function of the system , There is also a systematic mechanism 、 The external environment 、 Application and data security risks and security attributes .
4. Problem discovery patterns are different : The test is based on the violation of function definition . The security test is based on violating the constraints of authority and ability .
Difference from penetration test :
1. Starting point difference : Penetration testing is based on successful intrusion into the system , The starting point is to prove that the system has security problems ; Security testing is based on finding all possible security risks of the system .
2. Different perspectives : Penetration testing is to look at and think about problems from the perspective of attackers , Safety testing is to think from the perspective of the defender , Try to find all potential security risks that may be exploited by attackers , And guide them to repair .
3. Coverage differences : The penetration test only selects a few points as the test target , The security test is a complete test after analyzing the system architecture and finding out all possible attack interfaces of the system .
4. Cost differences : Security testing requires a functional evaluation of the system 、 The technology adopted by the system and the architecture of the system are analyzed , Therefore, it requires more time and manpower than penetration testing .
5. Solution differences : Penetration testing does not provide a targeted solution ; Security testing will analyze the causes of problems from the perspective of developers , Provide more effective solutions .
Two 、 Safety test method
1、 A functional test
Black box test method is adopted , Verify the design safety module
Such as : User management , Rights management , Encryption system
For user privacy , Check whether the user password is saved locally , Whether encrypted or not ; Check sensitive privacy information , Such as chat records 、 Relational chain 、 Whether the bank account number is encrypted ; Check whether the system files are 、 The configuration file is saved in clear text on the external device ; Some information that needs to be stored to external devices , It is necessary to judge whether the information has been tampered before each use .
File permissions , Check App directory , Its permission must not allow other group members to read and write .
For network transmission , Check whether sensitive information is encrypted in network transmission , Important data should be TLS perhaps SSL.http The request is clear text by default , If the security verification and encryption mechanism is bad , Scan through network sniffing , It's easy to guess and simulate requests , It could also be injected .
Explain protection for runtime , For software embedded with an interpreter , Check for presence XSS、SQL Inject holes ; Use webiew Of App, Check for presence URL Cheat vulnerabilities
Yes Android Component rights protection , prohibit App Internal components are called by any third party program . If you need components for external calls , Check whether there are signature restrictions on the caller
Upgrade for iteration , Check the integrity of the upgrade package 、 The legitimacy is verified , Avoid the upgrade package being hijacked .
Intercept the interface , adopt adb shell Command or third-party software acquisition root jurisdiction , Intercept the privacy information filled in by the user on the mobile interface , Then conduct malicious acts .
2、 Vulnerability scanning
Security vulnerability scanning , With the help of vulnerability scanner , It can automatically detect the security of remote or local hosts .
Host vulnerability scanner (Host Scanner):COPS、Tripewire、Tiger
Network vulnerability scanner (Net Scanner):Satan、ISS Internet Scanner
3、 Simulated attack experiments
Impersonation form :
Password guessing : Hackers identify available user accounts , Control the machine
out of buffer : Code layer vulnerabilities , Pointer to malicious code , Execute malicious instructions , Get control of the system
First of all : Understand the principle , Whether it's sql Inject 、xss still csrf etc. , It is necessary to understand the principle of intrusion , Otherwise, the test scope will be expanded . For example, someone asked me , You tested csrf Did you? ? Did you test permission session hijacking ? Did you exceed your authority in the test ? From stealing users cookies Different operations after , How to ensure cookies The key to testing is not to be used by others after being stolen . Only in this way can we reduce the harm of various nouns to testers .
second : We should transform the principle into use cases . For each page , Or functional pages ( Additions and deletions ) etc. . First determine whether it is necessary to test the page ( Static pages do sql Injection is not necessary ). Then transform the principle into appropriate use cases .

3、 ... and 、 Common ways to deal with safety problems
1、 Data security
AWS The server 、 Cloud ( Alibaba cloud ) And other deployed projects realize hot standby 、 Cold standby treatment
2、 Application layer security
Hang up , The mechanism can be started manually
Application one click deployment and startup
A little help
Finally, thank everyone who reads my article carefully , Watching the rise and attention of fans all the way , Reciprocity is always necessary , Although it's not very valuable , If you can use it, you can take it !
The house needs to be built layer by layer , Knowledge needs to be learned at one point one . We should lay a good foundation in the process of learning , More hands-on practice , Don't talk much , The last dry goods here ! I stayed up late to sort out the stages ( function 、 Interface 、 automation 、 performance 、 Test open ) Skills learning materials + Practical explanation , Very suitable for studying in private , It's much more efficient than self-study , Share with you .
Get off w/x/g/z/h: Software testing tips dao
Typing is not easy , If this article is helpful to you , Click a like, collect a hide and pay attention , Give the author an encouragement . It's also convenient for you to find it quickly next time .
边栏推荐
- All you want to know about interface testing is here
- Test interview question set UI automated test
- C # upper computer development - modify the window icon and exe file Icon
- NLP 学习之路
- Mongodb stats counts the space occupied by the collection
- Reentrantlock learning - lock release process
- Conda+pytorch environment tutorial
- 配置服务器环境
- Briefly describe the 11 core functional modules of MES system
- Support proxy direct connection to Oracle database, jumpserver fortress v2.24.0 release
猜你喜欢

自动化测试的使用场景

"Weilai Cup" 2022 Niuke summer multi school training camp 1

LeetCode-138-复制带随机指针的链表

Advantages of advanced anti DDoS IP in Hong Kong and which industries are suitable for use

配置服务器环境

How to protect e-commerce websites from network attacks?

数据湖--概念、特征、架构与案例概述

MapReduce(二)

从6月25日考试之后,看新考纲如何复习PMP

Don't casually pass the request to the asynchronous thread. You can't handle it. You have to use the startasync method
随机推荐
AttributeError: ‘Upsample‘ object has no attribute ‘recompute_ scale_ factor‘
测试面试题集-UI自动化测试
2022搭建企业级数据治理体系
用低代码搭建千人食品制造企业高效管理系统案例分析
ReentrantLock学习之---基本属性
[server data recovery] data recovery case of server storage shared folder loss
Tensorflow-GPU 1.15安装
C#创建及读取DAT文件案例
Here comes the most complete introduction to MES system
EN 1504-7 products for protection and repair of concrete structures corrosion prevention of reinforcement - CE certification
MapReduce(二)
NLP learning path
Data Lake -- concept, characteristics, architecture and case overview
A case study of building an efficient management system for a thousand person food manufacturing enterprise with low code
【YOLOv5】--详细版训练自己的数据集 保姆级学习日志记录 手把手教程
配置服务器环境
PMP practice once a day | don't get lost in the exam -7.26 (including agility + multiple choices)
节省50%成本 京东云发布新一代混合CDN产品
还在用Xshell?你out了,推荐一个更现代的终端连接工具
Cannot find current proxy: Set ‘exposeProxy‘ property on Advised to ‘true‘ to make it available