Thursday, September 8, 2011

Google Hacking Database Information

Advisories and Vulnerabilities (215 entries)
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.

Error Messages (68 entries)
Really retarded error messages that say WAY too much!

Files containing juicy info (230 entries)
No usernames or passwords, but interesting stuff none the less.

Files containing passwords (135 entries)
PASSWORDS, for the LOVE OF GOD!!! Google found PASSWORDS!

Files containing usernames (15 entries)
These files contain usernames, but no passwords… Still, google finding usernames on a web site..

Footholds (21 entries)
Examples of queries that can help a hacker gain a foothold into a web server

Pages containing login portals (232 entries)
These are login pages for various services. Consider them the front door of a website’s more sensitive functions.

Pages containing network or vulnerability data (59 entries)
These pages contain such things as firewall logs, honeypot logs, network information, IDS logs… all sorts of fun stuff!

sensitive Directories (61 entries)
Google’s collection of web sites sharing sensitive directories. The files contained in here will vary from sesitive to uber-secret!

sensitive Online Shopping Info (9 entries)
Examples of queries that can reveal online shopping info like customer data, suppliers, orders, creditcard numbers, credit card info, etc

Various Online Devices (201 entries)
This category contains things like printers, video cameras, and all sorts of cool things found on the web with Google.

Vulnerable Files (57 entries)
HUNDREDS of vulnerable files that Google can find on websites…

Vulnerable Servers (48 entries)
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the “Vulnerable Files” section.

Web Server Detection (72 entries)
These links demonstrate Google’s awesome ability to profile web servers..

Tuesday, September 6, 2011

password validation test cases

Translation:

  • matches a string of six or more characters;
  • that contains at least one digit (\d is shorthand for [0-9]);
  • at least one uppercase; and
  • at least one lowercase character.
inputresult of testreason
abcABCfalseno numbers
abc123falseno uppercase letters
abAB1falsetoo short
abAB12true-
Aa123456true-


another possibilities

I will start by telling you what makes a password strong.

  • It has more than 6 characters. The longer the password is, the harder to crack it using brute force attack.
  • It contains both small case and upper case characters. This doubles brute force attack time, because it needs to check both cases.
  • It contains also numerical characters. This adds another 10 possibilities for each character in the password and thus increases cracking time.
  • It contains special characters. This adds another 20 or more characters to the possibilities.
  • It contains more than 12 characters. This increases cracking time even more.

My approach was to give one point for each of the conditions above.

And I give a point for each of the conditions, the voting scale is the following

  • Very Weak
  • Weak
  • Better
  • Medium
  • Strong
  • Strongest

invalid and valid email id test cases

Valid Email addressReason
email@domain.comValid email
firstname.lastname@domain.comEmail contains dot in the address field
email@subdomain.domain.comEmail contains dot with subdomain
firstname+lastname@domain.comPlus sign is considered valid character
email@123.123.123.123Domain is valid IP address
email@[123.123.123.123]Square bracket around IP address is considered valid
"email"@domain.comQuotes around email is considered valid
1234567890@domain.comDigits in address are valid
email@domain-one.comDash in domain name is valid
_______@domain.comUnderscore in the address field is valid
email@domain.name.name is valid Top Level Domain name
email@domain.co.jpDot in Top Level Domain name also considered valid (use co.jp as example here)
firstname-lastname@domain.comDash in address field is valid

Invalid Email addressReason
plainaddressMissing @ sign and domain
#@%^%#$@#$@#.comGarbage
@domain.comMissing username
Joe Smith Encoded html within email is invalid
email.domain.comMissing @
email@domain@domain.comTwo @ sign
.email@domain.comLeading dot in address is not allowed
email.@domain.comTrailing dot in address is not allowed
email..email@domain.comMultiple dots
あいうえお@domain.comUnicode char as address
email@domain.com (Joe Smith)Text followed email is not allowed
email@domainMissing top level domain (.com/.net/.org/etc)
email@-domain.comLeading dash in front of domain is invalid
email@domain.web.web is not a valid top level domain
email@111.222.333.44444Invalid IP format
email@domain..comMultiple dot in the domain portion is invalid

file upload functionality test cases

UI:
1.Check if the browse... is ellipsis button in becasue it is going to show File open dialog.
2.Check the File open Dialogs File Filters(Supported File Types)
3.Check for the Init Capitalization of the File open Dialog if its a non standard(non common dialog ctrl) form.

Functional:
1.Start uploading the file and disconnect LAN.
2.Check server timeout(There usually is a Timeout for file upload)
3.Check upload from a disc which has no space left(usually the data will be cached to temp for rolling back)
4.Check upload for Folder(its should not be the case)
5.Check for multiple file uploads.
6.Check for Quality of images if the upload is specifically for images(the dithering of images should not happen - imagine uploading a scanned copy of cheque for payment director service)
7.Check for compressed /Readonly /Archived file uploads.
8.Start upload and immediately stop the Web(IIS,Apache) server.
9.test for Folder structure on server side.
10.test for LOBS and BLOBs in case the files go in DB.
11.Test for upload from a network(mapped drive)
12.Test for same file upload many times i.e. depends on the functionality some servers may rename it to xFilie_1, some may just add a new version e.g. Sharepoint. some may simply deny.