SlideShare uma empresa Scribd logo
1 de 43
Baixar para ler offline
Defying Logic
Theory, Design, and Implementation
     of Complex Systems for
     Testing Application Logic
Rafal Los & Prajakta Jagdale – HP Application Security
Act 1 – The Pledge
FOUNDATIONS
LET’S TALK ABOUT LOGIC
…FOLLOW THE RABBIT.
Define: Application Logic
Just what is ―application logic‖?

―Design components of a program,
  including the sequencing of steps
  prescriptive for how to execute intended
  business processes in a piece of
  software‖
Logic Primer
   A business process, ordering

 Log In     Select        Add        Verify
          Restaurant     Items       Order


Log Out    Loyalty     Transaction     Add
 (quit)    Points       Success      Payment
Logic Primer
    A broken business process?

 Log In     Select       Add      Verify
          Restaurant    Items     Order


Log Out   Transaction   Loyalty     Add
 (quit)    Success      Points    Payment
Logic Primer
Can we manipulate intended process?

    Log In     Select       Add      Verify
             Restaurant    Items     Order


   Log Out   Transaction   Loyalty     Add
    (quit)    Success      Points    Payment
Logic Primer
In this simple example:
 Manipulate a business process
 Early loyalty points without paying
  – Points = fraud (free stuff!)
  – Free meals = financial lo$$ to vendor
 Business process manipulated = theft,
 fraud, financial loss
Define: Logic Defect
A defect that exposes the component
  business processes (or execution flows)
  to manipulation from the attacker
  perspective to achieve unintended and
  undesirable consequences from the
  design perspective; without disrupting
  the general function or continuity of the
  application.
New Classifications
How is this different than existing
 classifications?
  – OWASP Top 10
  – WASC Threat Classification v2
  – MITRE CWE Top 25           Best “fit”

A fundamentally different way of
  looking at software vulnerabilities.
Building Onto CWE
   – MITRE CWE Top 25

―Classification of business-logic weaknesses is worth deeper
   investigation by researchers. While business logic rules are
   domain-specific, there may be some domain-independent
   patterns to them. We are likely to find new wrinkles to old
   problems, and maybe some new problems that will be easier to
   find once we know what to call them.‖ –Steven Christey (MITRE)
―Taxonomy‖


2 Types of logic-based defects
• Privilege manipulation
• Transaction control manipulation
Privilege Manipulation
Flaw based on broken or incomplete
  authentication/authorization mechanism


• Horizontal/vertical privilege escalation
• Access unauthorized content
• Perform privileged system functions
Privilege Manipulation
<input type="text" name="username" size="30"
  tabindex="100" value=―Wh1t3Rabbit"
  id="username― Role=―user”>

<input type="text" name="username" size="30"
  tabindex="100" value=―Wh1t3Rabbit"
  id="username― Role=―admin‖>
Transaction Control
           Manipulation
Flaw based on broken business process
  continuity allowing for manipulation of
  intended business process/flow


• Circumvent system limitations
• Tamper with application flow
• Manipulate business resources
Transaction Control
   Manipulation




      I want MORE
     than 10 tickets!
Transaction Control
   Manipulation
Transaction Control
   Manipulation
Manipulating ―Logic‖
The server should control the logic of the
 application.

In this case, the server should know 30 is
  not a valid number …right?!

………………………..Nope.
To Be Clear
The key point to remember:
 This research seeks to better enable the
 tester through automation.

We are addressing ‗designed processes‘
We are not addressing ‗back-end
 business process‘ (non-visible)
Starting a Wave
FEW previously given talks or papers on
 logic vulnerabilities
  – Ideas  talks  papers  experiements?
  – A more tangible/usable effort is needed


NO existing R&D effort by a vendor in this
 space as far as we could tell —
 proprietary or open source
Lots of Talking…
―So why aren‘t there any readily available,
  even semi-mature tools or frameworks
  for testing application logic?‖
Act 2 – The Turn
APPLICATION LOGIC VS.
AUTOMATION
Logic vs. Automation
Application Logic         Automation
 hard to define!         o pattern-dependent
 domain-specific         o programmatic
   Industry              o scale is in
   Business process        repeatability
 not pattern-based       o no concept of
   not easy to ‗RegEx‘     process
Challenges
For humans                 For technology
• understand the           • map the application
  application                processes
  – Business processes        – simple, flexible maps
  – ‗Application flow‘     • identify control logic
• drive automation            – critical parameters
  – work with technology   • differentiate test
• document & repeat          success or failure
Application Logic
Application ―logic‖ is tricky…
  – found on the server side
  – found in the client ―cache‖ (offline use?)
  – no consistent patterns to match/test
     • Remember the AT&T/iPad email hack?
  – logic implies human thought required
Simple Logic
Simplest logic block example…
  If <expression> Then
     do something
  ElseIf <expression> Then
     do something
  Else
     do something else
  End If
Challenges
Bridging a vast disconnect
  Client (browser)   App Server
  DOM
                     IF (var1 = A) {
     var1=A           do IsUser; }
     var2=B          ELSEIF (var1 = B)
     var3=1          {
     var4=@b          do IsAdmin; }
     var5=           ENDIF
Challenges
How to overcome random ―fuzzing‖
• identify var1 as a critical parameter
   – Human or automation-driven
• manipulate var1
   – human or technology driven
   – ―fuzzing‖ or data-set driven


 Technology enables scalability & repeatability
Future State  Fantasy
• Point ‗n‘ shoot application logic testing
  – This was never a good strategy anyway*
• Dynamic testing tool ‗learns‘ business
  processes, logic flow and thinks
  – I‘ve seen this movie before …‖SkyNet?‖
• Security continues to operate
  independent of business
Future State  Reality
• Logic testing enabled through
  automation
  – Base logic mapping on QA methodology
  – Continue to evolve combined functional,
    exploratory & security testing
• Technology allows repeatable testing
  throughout application after initial setup
This Has Been Coming
• Initially I talked about mapping
  application execution flow…
• Dynamic testing technology matured
• Static testing technology matured
• New ―hybrid‖ technology gives even
  greater insight into application function
Act 3 – The Prestige
BUILDING TEST
FRAMEWORKS
Overview
Test framework will constitute 3 phases
  I.   Capturing the assumed application
       behavior
  II. Manipulation of the workflows to evoke
       (un)expected behavior patterns
  III. Analyzing the results of the workflow
       manipulations to detect non-conformance
       with defined business processes
3 Step Process
• Model the business process
  – create valid workflows
• Manipulate application workflow
  – ‗fuzzing logic‘
• Analyze the results
  – Were we successful in evoking a non-
    standard response?
Modeling the Business
          Processes
• Purpose: Discover business processes that
  define the application workflow
• Challenge: Application workflow
  specifications are rarely documented and
  are often unknown to the testers
• Solution: Passively monitor & record normal
  user behavior through the application
Modeling the Business
          Processes
Proposed Approach
 Devise a mechanism to:
  – Capture permissible user actions
  – Store the state of the application before
    and after the invocation of each user event
  – Record expected transitions between
    application states
Manipulating the Application
          Workflow
• Purpose: Induce deviations in the application
  behavior that do not conform with the
  assumed business rules
• Challenge: Meaningfully manipulating
  application‘s behavior with minimal
  knowledge about its purpose & context
• Solution: Apply pre-defined modifications to
  the state identifiers and state transactions
  recorded in phase I
Manipulating the Application
          Workflow
Proposed Approach
 Discover logic defects by:
  – Modifying the state of the application
    before passing it as an input to a
    transaction
  – Fuzz the sequence of user actions
    captured during the phase I to detect bugs
    in transaction control
Analyzing the Results
• Purpose: Determine the success of
  workflow manipulation
• Challenge: Measuring the deviation in
  application behavior with minimal
  understanding of application context
• Solution: Apply comparison metrics to
  infer deviations in the application
  workflows
Analyzing the Results
Proposed approach
  – Measure the impact of workflow manipulations on
    the application state
     • compare state identifiers (e.g. system variables, page
       DOM) in the tainted workflow with the original
  – Apply pre-defined set of rules to detect violations
    of the business rules governing the application
    flow
     • E.g. An acceptable application end state can be reached
       despite inaccuracies in one or more intermediate states
       of the workflow
DEMO!

a rough idea of how this could
        work one day
Work In Progress

If you are interested in
  discussing, contributing, or
  expanding this research in any
  way – contact us.

Mais conteúdo relacionado

Mais procurados

SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug BountiesOWASP Nagpur
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewalldavidjohnrace
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration Tariq Islam
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) securityNahidul Kibria
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilitiesMohit Dholakiya
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemRoshan Ranabhat
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesMikhail Egorov
 
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)Adam Nurudini
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...Chris Gates
 

Mais procurados (20)

Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
SSRF For Bug Bounties
SSRF For Bug BountiesSSRF For Bug Bounties
SSRF For Bug Bounties
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
 
Xss ppt
Xss pptXss ppt
Xss ppt
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Web application security
Web application securityWeb application security
Web application security
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
A5: Security Misconfiguration
A5: Security Misconfiguration A5: Security Misconfiguration
A5: Security Misconfiguration
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Scanning web vulnerabilities
Scanning web vulnerabilitiesScanning web vulnerabilities
Scanning web vulnerabilities
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Hacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sitesHacking Adobe Experience Manager sites
Hacking Adobe Experience Manager sites
 
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)Unrestricted file upload CWE-434 -  Adam Nurudini (ISACA)
Unrestricted file upload CWE-434 - Adam Nurudini (ISACA)
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Xss (cross site scripting)
Xss (cross site scripting)Xss (cross site scripting)
Xss (cross site scripting)
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone  Sector...
Purple Teaming the Cyber Kill Chain: Practical Exercises for Everyone Sector...
 

Destaque

Security Bootcamp 2013 owasp top 10- 2013
Security Bootcamp 2013   owasp top 10- 2013Security Bootcamp 2013   owasp top 10- 2013
Security Bootcamp 2013 owasp top 10- 2013Security Bootcamp
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Ajay Negi
 
Chapter 1 Lecture
Chapter 1 LectureChapter 1 Lecture
Chapter 1 LectureJEngle
 
Human Resources for the Non-HR Manager Classroom course
Human Resources for the Non-HR Manager Classroom courseHuman Resources for the Non-HR Manager Classroom course
Human Resources for the Non-HR Manager Classroom courseO'Connor Ryan
 
5 effective leadership styles
5 effective leadership styles5 effective leadership styles
5 effective leadership stylesPuneet Yamparala
 
Teaching Business Acumen at CPG Companies
Teaching Business Acumen at CPG CompaniesTeaching Business Acumen at CPG Companies
Teaching Business Acumen at CPG CompaniesEnspire Learning
 
Perth Leadership Outcome Model - Perth Leadership Institute
Perth Leadership Outcome Model - Perth Leadership InstitutePerth Leadership Outcome Model - Perth Leadership Institute
Perth Leadership Outcome Model - Perth Leadership InstitutePerth Leadership Institute
 
Business Acumen - Ken Flamer
Business Acumen - Ken FlamerBusiness Acumen - Ken Flamer
Business Acumen - Ken FlamerKen Flamer
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structureRheigh Henley Calderon
 
Using Simulations for Business Acumen Development
Using Simulations for Business Acumen DevelopmentUsing Simulations for Business Acumen Development
Using Simulations for Business Acumen DevelopmentEnspire Learning
 
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)coloraccounting
 
Business Acumen For Hr Long
Business Acumen For Hr LongBusiness Acumen For Hr Long
Business Acumen For Hr Longcpdemers
 
Heckelman & Unger - Business acumen for strategic heckelman & unger
Heckelman & Unger - Business acumen for strategic heckelman & ungerHeckelman & Unger - Business acumen for strategic heckelman & unger
Heckelman & Unger - Business acumen for strategic heckelman & ungerHR Florida State Council, Inc.
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systemsBronte666
 
Hr for the non hr managers
Hr for the non hr managersHr for the non hr managers
Hr for the non hr managersSail Khan
 

Destaque (20)

L07 Oranizing Domain Logic
L07 Oranizing Domain LogicL07 Oranizing Domain Logic
L07 Oranizing Domain Logic
 
Security Bootcamp 2013 owasp top 10- 2013
Security Bootcamp 2013   owasp top 10- 2013Security Bootcamp 2013   owasp top 10- 2013
Security Bootcamp 2013 owasp top 10- 2013
 
Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)Logical Attacks(Vulnerability Research)
Logical Attacks(Vulnerability Research)
 
Chapter 1 Lecture
Chapter 1 LectureChapter 1 Lecture
Chapter 1 Lecture
 
Human Resources for the Non-HR Manager Classroom course
Human Resources for the Non-HR Manager Classroom courseHuman Resources for the Non-HR Manager Classroom course
Human Resources for the Non-HR Manager Classroom course
 
5 effective leadership styles
5 effective leadership styles5 effective leadership styles
5 effective leadership styles
 
Skills Academy_Commercial Awareness
Skills Academy_Commercial AwarenessSkills Academy_Commercial Awareness
Skills Academy_Commercial Awareness
 
Teaching Business Acumen at CPG Companies
Teaching Business Acumen at CPG CompaniesTeaching Business Acumen at CPG Companies
Teaching Business Acumen at CPG Companies
 
Perth Leadership Outcome Model - Perth Leadership Institute
Perth Leadership Outcome Model - Perth Leadership InstitutePerth Leadership Outcome Model - Perth Leadership Institute
Perth Leadership Outcome Model - Perth Leadership Institute
 
Business Acumen - Ken Flamer
Business Acumen - Ken FlamerBusiness Acumen - Ken Flamer
Business Acumen - Ken Flamer
 
Physical Architecture Layer Design
Physical Architecture Layer DesignPhysical Architecture Layer Design
Physical Architecture Layer Design
 
5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure5 problem solving with the sequential logic structure
5 problem solving with the sequential logic structure
 
Using Simulations for Business Acumen Development
Using Simulations for Business Acumen DevelopmentUsing Simulations for Business Acumen Development
Using Simulations for Business Acumen Development
 
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)
Business Acumen for Learning Professionals: An Innovative Approach (ASTD 2011)
 
Human Resources For Non HR Manager
Human Resources For Non HR ManagerHuman Resources For Non HR Manager
Human Resources For Non HR Manager
 
1832
18321832
1832
 
Business Acumen For Hr Long
Business Acumen For Hr LongBusiness Acumen For Hr Long
Business Acumen For Hr Long
 
Heckelman & Unger - Business acumen for strategic heckelman & unger
Heckelman & Unger - Business acumen for strategic heckelman & ungerHeckelman & Unger - Business acumen for strategic heckelman & unger
Heckelman & Unger - Business acumen for strategic heckelman & unger
 
1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
 
Hr for the non hr managers
Hr for the non hr managersHr for the non hr managers
Hr for the non hr managers
 

Semelhante a Defying Logic - Business Logic Testing with Automation

LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...
LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...
LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...Innovation Roots
 
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...LeanKanbanIndia
 
5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based TestingTurnKey Solutions
 
Agile Aspects of Performance Testing
Agile Aspects of Performance TestingAgile Aspects of Performance Testing
Agile Aspects of Performance TestingAlexander Podelko
 
Testing quick interview preparation
Testing quick interview preparationTesting quick interview preparation
Testing quick interview preparationtesting1001
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testingBipul Roy Bpl
 
Performance Continuous Integration
Performance Continuous IntegrationPerformance Continuous Integration
Performance Continuous IntegrationAlmudena Vivanco
 
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesCloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesIRJET Journal
 
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f..." Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...Lohika_Odessa_TechTalks
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptxjack952975
 
Rethinking Test Automation: The Case for Moving Beyond the User Interface
Rethinking Test Automation: The Case for Moving Beyond the User InterfaceRethinking Test Automation: The Case for Moving Beyond the User Interface
Rethinking Test Automation: The Case for Moving Beyond the User InterfaceCognizant
 
Getting Started with Apache Jmeter
Getting Started with Apache JmeterGetting Started with Apache Jmeter
Getting Started with Apache JmeterMindfire Solutions
 
Sivareddy 0000000000000000
Sivareddy 0000000000000000Sivareddy 0000000000000000
Sivareddy 0000000000000000sivareddyeda
 
How to manage your testing automation project ttm methodology
How to manage your testing automation project   ttm methodologyHow to manage your testing automation project   ttm methodology
How to manage your testing automation project ttm methodologyRam Yonish
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdfPradeepaKannan6
 

Semelhante a Defying Logic - Business Logic Testing with Automation (20)

LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...
LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...
LKIN17: Enabling Enterprise Agility though a Hybrid Agile Implementation Mode...
 
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...
Lean Kanban India 2017 | Case study - Hybrid Agile Implementation Model to En...
 
5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing5 Steps to Get Precise SAP Impact-Based Testing
5 Steps to Get Precise SAP Impact-Based Testing
 
Agile Aspects of Performance Testing
Agile Aspects of Performance TestingAgile Aspects of Performance Testing
Agile Aspects of Performance Testing
 
Testing quick interview preparation
Testing quick interview preparationTesting quick interview preparation
Testing quick interview preparation
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testing
 
Performance Continuous Integration
Performance Continuous IntegrationPerformance Continuous Integration
Performance Continuous Integration
 
Engineering operations
Engineering operationsEngineering operations
Engineering operations
 
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesCloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
 
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f..." Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
" Performance testing for Automation QA - why and how " by Andrey Kovalenko f...
 
prod-dev-management.pptx
prod-dev-management.pptxprod-dev-management.pptx
prod-dev-management.pptx
 
3Audit Software & Tools.pptx
3Audit Software & Tools.pptx3Audit Software & Tools.pptx
3Audit Software & Tools.pptx
 
Rethinking Test Automation: The Case for Moving Beyond the User Interface
Rethinking Test Automation: The Case for Moving Beyond the User InterfaceRethinking Test Automation: The Case for Moving Beyond the User Interface
Rethinking Test Automation: The Case for Moving Beyond the User Interface
 
Getting Started with Apache Jmeter
Getting Started with Apache JmeterGetting Started with Apache Jmeter
Getting Started with Apache Jmeter
 
Sivareddy 0000000000000000
Sivareddy 0000000000000000Sivareddy 0000000000000000
Sivareddy 0000000000000000
 
SDLCTesting
SDLCTestingSDLCTesting
SDLCTesting
 
Qa analyst training
Qa analyst training Qa analyst training
Qa analyst training
 
How to manage your testing automation project ttm methodology
How to manage your testing automation project   ttm methodologyHow to manage your testing automation project   ttm methodology
How to manage your testing automation project ttm methodology
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
 
Sanjay Sharma
Sanjay SharmaSanjay Sharma
Sanjay Sharma
 

Mais de Rafal Los

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfRafal Los
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityRafal Los
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)Rafal Los
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Rafal Los
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security MetricsRafal Los
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning warsRafal Los
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013Rafal Los
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Rafal Los
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rafal Los
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Rafal Los
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterpriseRafal Los
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessRafal Los
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Rafal Los
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Rafal Los
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security AssuranceRafal Los
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelRafal Los
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Rafal Los
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Rafal Los
 

Mais de Rafal Los (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdfThe 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
The 5 Ps of Preparedness - Hope is Not a Strategy [1].pdf
 
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber SecurityIrrational But Effective - Applying Parenthood Lessons to Cyber Security
Irrational But Effective - Applying Parenthood Lessons to Cyber Security
 
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
SAINTCON 21 - Of Sandcastles and Luck (Fixing Vulnerability Management)
 
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
Strategies and Tactics for Effectively Managing Vulnerabilities in Diverse En...
 
Lies, Fables and Security Metrics
Lies, Fables and Security MetricsLies, Fables and Security Metrics
Lies, Fables and Security Metrics
 
Losing battles, winning wars
Losing battles, winning warsLosing battles, winning wars
Losing battles, winning wars
 
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 20135 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
5 Things CFOs Need to Know About Enterprise Security - HP CFO Summit 2013
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
Operationalizing security intelligence for the mid market - Rafal Los - RSA C...
 
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
 
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]Cloud Security Alliance- Challanges of an elastic environment v8a [public]
Cloud Security Alliance- Challanges of an elastic environment v8a [public]
 
Threat modeling the security of the enterprise
Threat modeling the security of the enterpriseThreat modeling the security of the enterprise
Threat modeling the security of the enterprise
 
Making Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in BusinessMaking Measurable Gains - Contextualizing 'Secure' in Business
Making Measurable Gains - Contextualizing 'Secure' in Business
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...Software Security Assurance - Program Building (You're going to need a bigger...
Software Security Assurance - Program Building (You're going to need a bigger...
 
The Future of Software Security Assurance
The Future of Software Security AssuranceThe Future of Software Security Assurance
The Future of Software Security Assurance
 
Ultimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI ModelUltimate Hack! Layers 8 & 9 of the OSI Model
Ultimate Hack! Layers 8 & 9 of the OSI Model
 
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
Into the Rabbithole - Evolved Web App Security Testing (OWASP AppSec DC)
 
Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)Oh No They Didn't! 7 Web App Security Stories (v1.0)
Oh No They Didn't! 7 Web App Security Stories (v1.0)
 

Último

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Defying Logic - Business Logic Testing with Automation

  • 1. Defying Logic Theory, Design, and Implementation of Complex Systems for Testing Application Logic Rafal Los & Prajakta Jagdale – HP Application Security
  • 2. Act 1 – The Pledge FOUNDATIONS
  • 3. LET’S TALK ABOUT LOGIC …FOLLOW THE RABBIT.
  • 4. Define: Application Logic Just what is ―application logic‖? ―Design components of a program, including the sequencing of steps prescriptive for how to execute intended business processes in a piece of software‖
  • 5. Logic Primer A business process, ordering Log In Select Add Verify Restaurant Items Order Log Out Loyalty Transaction Add (quit) Points Success Payment
  • 6. Logic Primer A broken business process? Log In Select Add Verify Restaurant Items Order Log Out Transaction Loyalty Add (quit) Success Points Payment
  • 7. Logic Primer Can we manipulate intended process? Log In Select Add Verify Restaurant Items Order Log Out Transaction Loyalty Add (quit) Success Points Payment
  • 8. Logic Primer In this simple example: Manipulate a business process Early loyalty points without paying – Points = fraud (free stuff!) – Free meals = financial lo$$ to vendor Business process manipulated = theft, fraud, financial loss
  • 9. Define: Logic Defect A defect that exposes the component business processes (or execution flows) to manipulation from the attacker perspective to achieve unintended and undesirable consequences from the design perspective; without disrupting the general function or continuity of the application.
  • 10. New Classifications How is this different than existing classifications? – OWASP Top 10 – WASC Threat Classification v2 – MITRE CWE Top 25 Best “fit” A fundamentally different way of looking at software vulnerabilities.
  • 11. Building Onto CWE – MITRE CWE Top 25 ―Classification of business-logic weaknesses is worth deeper investigation by researchers. While business logic rules are domain-specific, there may be some domain-independent patterns to them. We are likely to find new wrinkles to old problems, and maybe some new problems that will be easier to find once we know what to call them.‖ –Steven Christey (MITRE)
  • 12. ―Taxonomy‖ 2 Types of logic-based defects • Privilege manipulation • Transaction control manipulation
  • 13. Privilege Manipulation Flaw based on broken or incomplete authentication/authorization mechanism • Horizontal/vertical privilege escalation • Access unauthorized content • Perform privileged system functions
  • 14. Privilege Manipulation <input type="text" name="username" size="30" tabindex="100" value=―Wh1t3Rabbit" id="username― Role=―user”> <input type="text" name="username" size="30" tabindex="100" value=―Wh1t3Rabbit" id="username― Role=―admin‖>
  • 15. Transaction Control Manipulation Flaw based on broken business process continuity allowing for manipulation of intended business process/flow • Circumvent system limitations • Tamper with application flow • Manipulate business resources
  • 16. Transaction Control Manipulation I want MORE than 10 tickets!
  • 17. Transaction Control Manipulation
  • 18. Transaction Control Manipulation
  • 19. Manipulating ―Logic‖ The server should control the logic of the application. In this case, the server should know 30 is not a valid number …right?! ………………………..Nope.
  • 20. To Be Clear The key point to remember: This research seeks to better enable the tester through automation. We are addressing ‗designed processes‘ We are not addressing ‗back-end business process‘ (non-visible)
  • 21. Starting a Wave FEW previously given talks or papers on logic vulnerabilities – Ideas  talks  papers  experiements? – A more tangible/usable effort is needed NO existing R&D effort by a vendor in this space as far as we could tell — proprietary or open source
  • 22. Lots of Talking… ―So why aren‘t there any readily available, even semi-mature tools or frameworks for testing application logic?‖
  • 23. Act 2 – The Turn APPLICATION LOGIC VS. AUTOMATION
  • 24. Logic vs. Automation Application Logic Automation  hard to define! o pattern-dependent  domain-specific o programmatic  Industry o scale is in  Business process repeatability  not pattern-based o no concept of  not easy to ‗RegEx‘ process
  • 25. Challenges For humans For technology • understand the • map the application application processes – Business processes – simple, flexible maps – ‗Application flow‘ • identify control logic • drive automation – critical parameters – work with technology • differentiate test • document & repeat success or failure
  • 26. Application Logic Application ―logic‖ is tricky… – found on the server side – found in the client ―cache‖ (offline use?) – no consistent patterns to match/test • Remember the AT&T/iPad email hack? – logic implies human thought required
  • 27. Simple Logic Simplest logic block example… If <expression> Then do something ElseIf <expression> Then do something Else do something else End If
  • 28. Challenges Bridging a vast disconnect Client (browser) App Server DOM IF (var1 = A) { var1=A do IsUser; } var2=B ELSEIF (var1 = B) var3=1 { var4=@b do IsAdmin; } var5= ENDIF
  • 29. Challenges How to overcome random ―fuzzing‖ • identify var1 as a critical parameter – Human or automation-driven • manipulate var1 – human or technology driven – ―fuzzing‖ or data-set driven Technology enables scalability & repeatability
  • 30. Future State  Fantasy • Point ‗n‘ shoot application logic testing – This was never a good strategy anyway* • Dynamic testing tool ‗learns‘ business processes, logic flow and thinks – I‘ve seen this movie before …‖SkyNet?‖ • Security continues to operate independent of business
  • 31. Future State  Reality • Logic testing enabled through automation – Base logic mapping on QA methodology – Continue to evolve combined functional, exploratory & security testing • Technology allows repeatable testing throughout application after initial setup
  • 32. This Has Been Coming • Initially I talked about mapping application execution flow… • Dynamic testing technology matured • Static testing technology matured • New ―hybrid‖ technology gives even greater insight into application function
  • 33. Act 3 – The Prestige BUILDING TEST FRAMEWORKS
  • 34. Overview Test framework will constitute 3 phases I. Capturing the assumed application behavior II. Manipulation of the workflows to evoke (un)expected behavior patterns III. Analyzing the results of the workflow manipulations to detect non-conformance with defined business processes
  • 35. 3 Step Process • Model the business process – create valid workflows • Manipulate application workflow – ‗fuzzing logic‘ • Analyze the results – Were we successful in evoking a non- standard response?
  • 36. Modeling the Business Processes • Purpose: Discover business processes that define the application workflow • Challenge: Application workflow specifications are rarely documented and are often unknown to the testers • Solution: Passively monitor & record normal user behavior through the application
  • 37. Modeling the Business Processes Proposed Approach Devise a mechanism to: – Capture permissible user actions – Store the state of the application before and after the invocation of each user event – Record expected transitions between application states
  • 38. Manipulating the Application Workflow • Purpose: Induce deviations in the application behavior that do not conform with the assumed business rules • Challenge: Meaningfully manipulating application‘s behavior with minimal knowledge about its purpose & context • Solution: Apply pre-defined modifications to the state identifiers and state transactions recorded in phase I
  • 39. Manipulating the Application Workflow Proposed Approach Discover logic defects by: – Modifying the state of the application before passing it as an input to a transaction – Fuzz the sequence of user actions captured during the phase I to detect bugs in transaction control
  • 40. Analyzing the Results • Purpose: Determine the success of workflow manipulation • Challenge: Measuring the deviation in application behavior with minimal understanding of application context • Solution: Apply comparison metrics to infer deviations in the application workflows
  • 41. Analyzing the Results Proposed approach – Measure the impact of workflow manipulations on the application state • compare state identifiers (e.g. system variables, page DOM) in the tainted workflow with the original – Apply pre-defined set of rules to detect violations of the business rules governing the application flow • E.g. An acceptable application end state can be reached despite inaccuracies in one or more intermediate states of the workflow
  • 42. DEMO! a rough idea of how this could work one day
  • 43. Work In Progress If you are interested in discussing, contributing, or expanding this research in any way – contact us.