Task: Analyze Target
This task describes the main steps performed in analyzing the test target.
Purpose
Gain understanding about the test target to ensure proper application assessment.
Relationships
Main Description

Conducting a thorough security assessment requires that you obtain a certain degree of understanding about the Web application that you plan to test. Knowing something about the architecture of the application and its functionality will go a long way toward ensuring a successful assessment.

In some cases, your assignment may have a broader scope. You may be given a range of IP addresses and required to assess if there are any Web properties on that range that expose the organization to a security risk. If that is the case, you will have to identify all of the hosts of Web properties (applications) on the given IP range. There are different tools and techniques for doing this. Security auditors often utilize port scanners for this task.

In other cases, your assignment may include testing only several or a single Web application. It is generally recommended that you request a walk-through of the application by one of its developers.

Here are some examples of what you need to learn about an application:

  • Application hosts
  • Web server type
  • Web technologies
  • Authentication and authorization mechanisms
  • Login management details (for instance, concurrent logins and logout links)
  • Session state implementation
  • Application functions
  • Areas that require user input
Steps
Discover Hosts on Target IP address range (optional)
Identify all of the hosts and applications for the target IP range, using port scanners or any other similar tools.
Analyze each Application to Gain Understanding of its Architecture and Functionality

Gather all of the relevant information about the application(s) to be assessed without running any tests, and try to get their size and scale. If possible, review the code, because this might point you to the areas on which you would like to focus the testing.

Properties
Predecessor
Multiple Occurrences
Event Driven
Ongoing
Optional
Planned
Repeatable