当前位置:网站首页>What is web application security testing technology?
What is web application security testing technology?
2022-07-01 17:58:00 【Yisixun College】
In order to find software vulnerabilities and defects , Make sure Web The application is secure before and after delivery , We need to make use of Web Apply security testing techniques to identify Web Weaknesses and vulnerabilities of the architecture in the application , And before hackers can find and use them .
Web After years of development, applied security testing technology , At present, the commonly used technologies in the industry are mainly divided into 3 Major categories .
DAST:
Dynamic application security testing (Dynamic Application Security Testing) Technology analyzes the dynamic running state of an application in the test or run phase . It simulates hackers to attack applications dynamically , Analyze the response of the application , To determine the Web Whether the application is vulnerable .
DAST It is a black box testing technology , Is currently the most widely used 、 Use the simplest one Web Apply security testing methods , Tools commonly used by safety engineers, such as AWVS、AppScan Waiting is based on DAST Principle products .
SAST:
Static application security testing (Static Application Security Testing) Technology usually analyzes the syntax of the application's source code or binary files in the coding phase 、 structure 、 The process 、 Interface to find the security vulnerabilities in the program code .
exceed 50% The security vulnerability of is caused by wrong coding , Developers generally lack safety development awareness and skills , Pay more attention to the realization of business functions . If you want to control vulnerabilities from the source, you need to develop a code detection mechanism ,SAST It is a kind of test plan to test the source code and find security vulnerabilities in the development stage .
IAST:
Interactive application security testing (Interactive Application Security Testing) yes 2012 year Gartner A new application security testing solution proposed by the company , Through agency 、VPN Or deploy on the server side Agent Program , collect 、 monitor Web Application runtime function execution 、 The data transfer , And interact with the scanner in real time , Efficient 、 Accurately identify security defects and vulnerabilities , At the same time, it can accurately determine the code file where the vulnerability lies 、 Row number 、 Functions and parameters .IAST Equivalent to DAST and SAST An interrelated runtime security detection technology combined with .
IAST Interactive application security testing technology is a hot new application security testing technology in recent years , Ever been Gartner The consulting company is listed as a leader in the field of network security Top 10 One of the technologies .IAST Integrated DAST and SAST The advantages of , The vulnerability detection rate is very high 、 False positives are extremely low , At the same time, you can locate API Interfaces and code snippets .
边栏推荐
- . Net cloud native architect training camp (permission system code implements actionaccess) -- learning notes
- Work and leisure suggestions of old programmers
- Report on research and investment prospects of UHMWPE industry in China (2022 Edition)
- Enter wechat applet
- SQL injection vulnerability (MySQL and MSSQL features)
- How to use JMeter function and mockjs function in metersphere interface test
- Nearly 60% of the employees strongly support Ctrip's "3+2" working mode, and work at home for two days a week
- [splishsplash] about how to receive / display user parameters, MVC mode and genparam on GUI and JSON
- 传感器尺寸、像素、DPI分辨率、英寸、毫米的关系
- What are the six steps of the software development process? How to draw software development flow chart?
猜你喜欢

. Net cloud native architect training camp (permission system code implements actionaccess) -- learning notes

How to use JMeter function and mockjs function in metersphere interface test

Fresh, 2022 advanced Android interview must know 100 questions (interview questions + answer analysis)

Leetcode 1380. Lucky numbers in the matrix (save the minimum number of each row and the maximum number of each column)

Source code of new campus errand / campus task platform on mutual station

Replace UUID, nanoid is faster and safer!

How to write good code - Defensive Programming Guide
![Integer array merge [JS]](/img/0d/70535e0eb1c299bda25159b58c70d7.png)
Integer array merge [JS]

Yuancosmos game farmersworld farmers world - core content of the second conference in China!

Detailed explanation of string's trim() and substring()
随机推荐
Rotation order and universal lock of unity panel
深度优先遍历和广度优先遍历[通俗易懂]
Countdownlatch blocking wait for multithreading concurrency
Product service, operation characteristics
Common design parameters of solid rocket motor
Openlayers 自定义气泡框以及定位到气泡框
目前炒期货在哪里开户最正规安全?怎么期货开户?
An example of data analysis of an old swatch and an old hard disk disassembly and assembly combined with the sensor of an electromagnetic press
Pyqt5, draw a histogram on the control
Function, condition, regular expression
Check log4j problems using stain analysis
JDBC:深入理解PreparedStatement和Statement[通俗易懂]
[Verilog quick start of Niuke network question brushing series] ~ priority encoder circuit ①
【Try to Hack】vulnhub DC4
Enter wechat applet
Encryption and decryption of tinyurl in leetcode
(十六)ADC转换实验
ACM mm 2022 video understanding challenge video classification track champion autox team technology sharing
Explain in detail the process of realizing Chinese text classification by CNN
June issue | antdb database participated in the preparation of the "Database Development Research Report" and appeared on the list of information technology and entrepreneurship industries