BlackBox Security Testing
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGenocSlpBEjlslGkhO67ljKi9cwrkSxbftA3PY_KYFtia15IyhA5dfwUvyk7X779Jqc0LfRsBsCr8pSt9nK4goEGr40WRdPtoff7PtWEcV2bzq_tLjsFVJJHpbV8_LVugnPPB_6K-h2k/s640/download+%25281%2529.jpeg)
WhiteBox Security Testing
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK3n7ff7FhI_QxYQlZ4_zmrW0pev5UM0hwmXRjqn6H3XpmCc3G0xrTkPUfQsUTxz8hw4csoQ_dfsMuG2r-beibQ23IM2qDTxkrToOOmgwx090Iq13WgpIu0OuN5QVtsntY8AHPl6EzoNc/s640/White-Box-Testing.jpg)
- The tester has no knowledge of the technology or frameworks that the application is built on.
- The application is tested from outside in.
- This type of testing represents the hacker approach.
- This, in one sense, could be called as reverse engineering.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGenocSlpBEjlslGkhO67ljKi9cwrkSxbftA3PY_KYFtia15IyhA5dfwUvyk7X779Jqc0LfRsBsCr8pSt9nK4goEGr40WRdPtoff7PtWEcV2bzq_tLjsFVJJHpbV8_LVugnPPB_6K-h2k/s640/download+%25281%2529.jpeg)
WhiteBox Security Testing
- The tester has access to the underlying framework, design and implementation.
- The application is tested from the inside out.
- This type of testing represents the developer approach.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK3n7ff7FhI_QxYQlZ4_zmrW0pev5UM0hwmXRjqn6H3XpmCc3G0xrTkPUfQsUTxz8hw4csoQ_dfsMuG2r-beibQ23IM2qDTxkrToOOmgwx090Iq13WgpIu0OuN5QVtsntY8AHPl6EzoNc/s640/White-Box-Testing.jpg)
No comments:
Post a Comment