Professional Documents
Culture Documents
Intro To DGIT Security Testing
Intro To DGIT Security Testing
Fuzzing
Modify the
Tamper the cookie
parameter
e x tra
Ente
r ppe nd d
malf A loa
orme pay
inp u d Insert code
t to execute
Objectives of Security Testing
Visible Invisible
Feasible fuzzing via portal’s input fields Feasible fuzzing via URL
Feasible fuzzing via request packet
manipulation
Vulnerabilities to Hunt
Note:
The percentage reflects the no. of discovered vulnerabilities
out of the total no. of tested vulnerabilities
Good news: the discovered vulnerabilities are mitigable
Current State of Telflow 10-0.system
Question?