Fault Model for Penetration Testing of Web Applications

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Muniba Asghar, 01-241181-017
dc.date.accessioned 2023-02-22T08:20:16Z
dc.date.available 2023-02-22T08:20:16Z
dc.date.issued 2020
dc.identifier.uri http://hdl.handle.net/123456789/14942
dc.description Supervised by Dr. Tamim Ahmed en_US
dc.description.abstract Web applications have gained much of attention in today's world of internet. Now a days web applications are integral part of almost every business. Therefore, security in web applications cannot be sidestepped anymore. Penetration testing is an important aspect for the quality of web security. Purpose of penetration testing is to successfully penetrate the system without causing any damage and find vulnerabilities in the system that can be exploited by hackers. To perform efficient penetration testing comprehensive fault model is required. Fault models help us in identify test scenarios systematically. In this thesis, we propose a fault model for penetration testing in web applications comprising of fault domain, fault types, coverage criteria and test generation. We provide 7 different test patterns to help drive abstract test cases. Further we provide template for traceability of test cases which helps in identify test coverage of specific system or testing cycle/activity. We specify physical location of faults as dimension and treat OWASP and NIST as baseline standards for classification of faults. For evaluation, we make use of real time projects as case studies. We generate test cases from our fault model and execute them against each case study. We selected two case studies Qalum guru and Pakistan testing service (PTS) for detailed execution. We also select Facebook and Dropbox for execution of selective test cases to show execution of fault model-based test cases on such applications. As we use real time projects as our case study, so we only execute nondestructive test cases on our applications. Proposed fault model-based test cases detect faults. Results of our case study shows that alone cannot detect all vulnerabilities in application whereas manual methods requiring a comprehensive list of fault domains, fault types and coverage criteria can prove more beneficial. Our reason to consider running applications is to show that there is penetration testing requirement even in commercial products and services already in use. We point out that the testing activity, done previously, was not motivated by presence of a fault model and resulting test patterns. en_US
dc.language.iso en en_US
dc.publisher Software Engineering, Bahria University Engineering School Islamabad en_US
dc.relation.ispartofseries MS-SE;T-2044
dc.subject Software Engineering en_US
dc.title Fault Model for Penetration Testing of Web Applications en_US
dc.type MS Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account