JTest简单试用

安装JTest
拷贝破解文件lic_client.jar到
\Parasoft\Test\9.4\plugins\com.parasoft.xtest.libs_9.4.0.20120412\Parasoft\


创建附带案例,例如JPetStore、WebGoat等


JTest静态分析包含安全编程规则扫描
参考:jtest9_users_guide.pdf
Lesson 21: Using Jtest to Find Security Vulnerabilities
支持的规则集包括:
Jtest can also be used "out of the box" to identify common security vulnerabilities through both static
code analysis (based on pattern-matching coding standard rules) and flow-based static analysis (Bug-
Detective). Jtest provides several customizable Test Configurations for this purpose, including:
• Cigital Java Security Rulepack: Checks for security issues identified by Cigital (an independent
consulting company) in specific technology such as J2EE, Struts, Java Cryptography, etc.
(http://www.cigital.com/securitypack/view/index.html)
    Cigital and Fortify Software Release Cigital Java Security Rulepack 1.0
    http://www.linux-mag.com/id/6938/


• CWE-SANS Top 25 2011 Most Dangerous Programming Errors: Checks for dangerous
coding errors in 25 categories identified by the SANS Institute of Maryland with help from more
than 30 organizations, including the US National Security Agency, the Department of Homeland
Security, Microsoft, and Symantec. (http://cwe.mitre.org/top25/index.html)


• HIPAA Security Assessment: Checks rules that help you comply with HIPAA requirements
for the proper encoding, privacy, security, integrity, and availability of patient health data.
(http://www.hhs.gov/ocr/privacy/)


• NIST SAMATE 2010: Checks for the security issues referenced in the "Report on the Third
Static Analysis Tool Exposition (SATE 2010)", Vadim Okun, Aurelien Delaitre, Paul E. Black,
editors, U.S. National Institute of Standards and Technology (NIST) Special Publication (SP)
500-283, October, 2011. (http://samate.nist.gov/SATE2010.html)


• OWASP Top 10 2010 Security Vulnerabilities: Checks for the security issues referenced in
the OWASP Top 10 Security Vulnerabilities (https://www.owasp.org/index.php/Top_10_2010).
This enables you to identify code which could result in the most critical web application security
vulnerabilities, including:
• Injection
• Cross Site Scripting (XSS)
• Broken Authentication and Session Management
• Insecure Direct Object References
• Cross-Site Forgery Requests
• Security Misconfiguration
• Insecure Cryptographic Storage
• Failure to Restrict URL Access
• Insufficient Transport Layer Protection
• Unvalidated Redirects and Forwards


• PCI Data Security Standard: Checks for security issues referenced in section 6 of the Payment
Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements
for enhancing payment account data security (https://www.pcisecuritystandards.org/
security_standards/pci_dss.shtml). This enables you to rapidly assess the level of compliance—
without spending time reading the PCI DSS specification and determining how the
requirements translate to code.


• Security Assessment: Provides an “out of the box” assessment of code’s vulnerability to a
wide range of security attacks.
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值