Friday, July 19, 2019

Phases in software development project,overview.

Aim: Phases in software development project, overview.

Software Development Life Cycle (SDLC) is a process used by the software
industry to design, develop and test high quality software’s. The SDLC aims to
produce a high-quality software that meets or exceeds customer expectations,
reaches completion within times and cost estimates.

  •  SDLC is the acronym of Software Development Life Cycle.
  •  It is also called as Software Development Process.
  •  SDLC is a framework defining tasks performed at each step in the software development process.

What is SDLC?


SDLC is a process followed for a software project, within a software
organization. It consists of a detailed plan describing how to develop, maintain,
replace and alter or enhance specific software. The life cycle defines a
methodology for improving the quality of software and the overall development
process.
The following figure is a graphical representation of the various stages of a
typical SDLC.


Stage 1: Planning and Requirement Analysis:-


Requirement analysis is the most important and fundamental stage in SDLC. It is performed by the senior members of the team with inputs from the customer, the sales department, market surveys and domain experts in the industry. This information is then used to plan the basic project approach and to conduct product feasibility study in the economical, operational and technical areas.
Planning for the quality assurance requirements and identification of the risks associated with the project is also done in the planning stage. The outcome of the technical feasibility study is to define the various technical approaches that can be followed to implement the project successfully with minimum risks.

Stage 2: Defining Requirements:-


Once the requirement analysis is done the next step is to clearly define and document the product requirements and get them approved from the customer or the market analysts. This is done through an SRS (Software Requirement Specification) document which consists of all the product requirements to be designed and developed during the project life cycle.

Stage 3: Designing the Product Architecture:-


SRS is the reference for product architects to come out with the best architecture for the product to be developed. Based on the requirements specified in SRS, usually more than one design approach for the product architecture is proposed and documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk assessment, product robustness, design modularity, budget and time constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its communication and data flow representation with the external and third party modules (if any). The internal design of all the modules of the proposed architecture should be clearly defined with the minutest of the details in DDS.

Stage 4: Building or Developing the Product:-


In this stage of SDLC the actual development starts and the product is built. The programming code is generated as per DDS during this stage. If the design is performed in a detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and programming tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The programming language is chosen with respect to the type of software being developed.

Stage 5: Testing the Product:-


This stage is usually a subset of all the stages as in the modern SDLC models, the testing activities are mostly involved in all the stages of SDLC. However, this stage refers to the testing only stage of the product where product defects are reported, tracked, fixed and retested, until the product reaches the quality standards defined in the SRS.

Stage 6: Deployment in the Market and Maintenance:-


Once the product is tested and ready to be deployed it is released formally in the appropriate market. Sometimes product deployment happens in stages as per the business strategy of that organization. The product may first be released in a limited segment and tested in the real business environment (UAT- User acceptance testing).
Then based on the feedback, the product may be released as it is or with suggested enhancements in the targeting market segment. After the product is released in the market, its maintenance is done for the existing customer base.

SDLC Models:-

 

There are various software development life cycle models defined and designed which are followed during the software development process. These models are also referred as Software Development Process Models". Each process model follows a Series of steps unique to its type to ensure success in the process of software development.
      Waterfall Model                       
      Iterative Model
      Spiral Model
      V-Model
      Big Bang Model
      Agile Model
      RAD Model
      Rapid Application Development and Prototyping Models

How to install DVWA in Linux System / Windows ?

Video Tutorial


Pre-requiredment of DVWA installation
  • Required install Xmapp or Wamp server click there name for Download Software ( windows only ).
  • For linux users they have to install LAMP server.
  • Download DVWA source code and put in your web server folder.
  • Now you can follow the video tutorial steps.

Monday, July 1, 2019

Network vulnerability using OpenVAS

What is OpenVAS ?
OpenVAS (Open Vulnerability Assessment System)is a framework of different services and tools offering a powerful vulnerability scanning and vulnerability management solution.

The security scanner is accompanied with a daily updated feed of Network Vulnerability Tests (NVTs), over 40,000+.

All OpenVAS products are Free Software and available over the internet.

Following is structure of OpenVAS


Video Tutorial




Step 1


Step 2


Step 3


Step 4


Step 5


Step 6


Step 7


Step 8


Step 9


Step 10


Step 11


Step 12


Step 13



Sunday, June 30, 2019

How to install OpenVAS in Linux System ?

Video Tutorial

how to Create Certificate ?



How to add user for OpenVAS ?


Start Scanner, load all plugins and create client certificate 


Rebuild the database, Starting OpenVAS Manager, Administrator and Greenbone Security Assistant


TCP / UDP connectivity using Netcat

What is Netcat
Netcat (nc) is a computer networking service for reading from and writing to network connections using TCP or UDP.
it is a feature-rich network debugging and investigation tool
  • Its list of features includes
    • port scanning
    • port binding
    • transferring files
    • port listening
    • it can be used as a backdoor
    • Ability to use any local source port
Netcat Command Flags

Command FlagsDescription
-uUDP (User Datagram Protocol)
-zDon't send any Data, just emit a packet without payload(scanning)
-vbe verbose : print out messages on standard information
-ndo not perform DNS lookup on name of system on the other side
-lListen mode
-LListen harder
How To Use Netcat for Port Scanning
Here, we can scan all ports up to 1000 by issuing this command: 
netcat -z -v targetdomain.com 1-1000
Output

Scan will go much faster if you know the IP address that you need.
netcat -z -n -v 127.0.0.1 1-1000
output 

How To Communicate through Netcat
Netcat is not restricted to sending TCP and UDP packets. It also can listen on a port for connections and packets. This gives us the opportunity to connect two instances of netcat in a client-server relationship. 
one system, you can tell netcat to listen to a specific port for connections. 
netcat -l 1234
This will tell netcat to listen for TCP connections on port 1234 
second server, we can connect to the first machine on the port number we choose
netcat targetdomain.com 1234
Type a message and press ENTER. It will appear on both the local and remote screen. This works in the opposite direction as well. When you are finished passing messages, you can press CTRL-D to close the TCP connection

Port scanning using NMAP

What is Nmap
  • Nmap (Network Mapper) is a free and open source (license) utility.
  • Nmap can network discovery and security auditing.
  • Many systems and network administrators also find it useful for tasks such as
    • network inventory
    • managing service upgrade schedules
    • monitoring host
    • service uptime
  • Nmap uses raw IP packets in novel ways to determine
    • what hosts are available on the network
    • what services (application name and version) those hosts are offering
    • what operating systems (and OS versions) they are running
    • what type of packet firewall are in use
    • and dozens of other characteristics
What is TCP Scanning
  • The two basic scan types used most in Nmap are
    • TCP connect scanning
      • sockets programming uses a system call named connect to begin a TCP connection to a remote site. If connect succeeds, a connection was made.This allows a basic type of port scan, which attempts to connect to every port in turn, and notes whether or not the connection succeeded. Once the scan is completed, ports to which a connection could be established are listed as open, the rest are said to be closed. 
    • TCP SYN scanning
      • When a TCP connection is made between two systems, a process known as a "three way handshake" occurs. This involves the exchange of three packets, and synchronises the systems with each other. 
Nmap Practical using Nmap tools



Step 1 : Open Zenmap in your computer


Step 2 : In Target Filed Write IP Address or Website (Target System) and click on scan button
In Following Image we include UDP port scan


Step 3 : You can find open port list if they are otherwise u cant get any open port


Step 4 : You can find Traceroute path on Topology tab


Step 5 : You can find all the host details in Host Details tab


How to Install Nmap(zenmap) in Windows and Linux
Download the Software Form this source:Nmap
How to Install Nmap(zenmap) in Linux RPM


TCP scanning using NMAP

What is Nmap
  • Nmap (Network Mapper) is a free and open source (license) utility.
  • Nmap can network discovery and security auditing.
  • Many systems and network administrators also find it useful for tasks such as
    • network inventory
    • managing service upgrade schedules
    • monitoring host
    • service uptime
  • Nmap uses raw IP packets in novel ways to determine
    • what hosts are available on the network
    • what services (application name and version) those hosts are offering
    • what operating systems (and OS versions) they are running
    • what type of packet firewall are in use
    • and dozens of other characteristics
What is TCP Scanning
  • The two basic scan types used most in Nmap are
    • TCP connect scanning
      • sockets programming uses a system call named connect to begin a TCP connection to a remote site. If connect succeeds, a connection was made.This allows a basic type of port scan, which attempts to connect to every port in turn, and notes whether or not the connection succeeded. Once the scan is completed, ports to which a connection could be established are listed as open, the rest are said to be closed. 
    • TCP SYN scanning
      • When a TCP connection is made between two systems, a process known as a "three way handshake" occurs. This involves the exchange of three packets, and synchronises the systems with each other. 
Nmap Practical using Nmap tools



Step 1 : Open Zenmap in your computer


Step 2 : In Target Filed Write IP Address or Website (Target System) and click on scan button


Step 3 : You can find open port list if they are otherwise u can't get any open port

Step 4 : You can find Traceroute path on Topology tab


Step 5 : You can find all the host details in Host Details tab



How to Install Nmap(zenmap) in Windows and Linux
Download the Software Form this source:Nmap
How to Install Nmap(zenmap) in Linux RPM

Prepare a sequence diagram for issuing a book in the library management system


Prepare an activity diagram for computing a restaurant bill, there should be charge for each delivered item. The total amount should be subject to tax and service charge of 18% for group of six and more. For smaller groups there should be a blank entry. Any coupons or gift certificates submitted by the customer should be subtracted

Prepare a use case diagram and sequence diagram for a computer email system

Prepare a state diagram for an interactive diagram editor for selecting and dragging objects


Categorize the following relationships into generalization, aggregation or association

A country has a capital city


A dining philosopher uses a fork


A file is an ordinary file or a directory file


Files contains records


A polygon is composed of an ordered set of points


A drawing object is text, a geometrical object, or a group


A person uses a computer language on a object


Modems and keyboards are input/output devices


Classes may have several attributes


A person plays for a team in a certain year


A route connects two cities


A student takes a course from a professor


Prepare a class diagram for given group of classes using multiplicity, generalization, association concepts. And add at least 5-7 attributes and 3-5 operations for particular class. City, Airport, Airline, Pilot, Flight, Plane, Seat, Passenger