Security testing

Tabăra de Testare
13 de May de 2013
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
Security testing
1 de 66

Mais conteúdo relacionado

Mais procurados

Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With ExamplesAlwin Thayyil
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security TestingvodQA
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital

Mais procurados(20)

Destaque

Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWebsecurify
Security testing ?Security testing ?
Security testing ?Maikel Ninaber
Web Application Security 101 - 03 Web Security ToolkitWeb Application Security 101 - 03 Web Security Toolkit
Web Application Security 101 - 03 Web Security ToolkitWebsecurify
we45 - Web Application Security Testing Case Studywe45 - Web Application Security Testing Case Study
we45 - Web Application Security Testing Case Studywe45
DevOpsCon 2016 - Continuous Security Testing - Stephan KapsDevOpsCon 2016 - Continuous Security Testing - Stephan Kaps
DevOpsCon 2016 - Continuous Security Testing - Stephan KapsStephan Kaps
Security testingSecurity testing
Security testingRihab Chebbah

Similar a Security testing

Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developerSameer Paradia
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
Application Security 101 (OWASP DC)Application Security 101 (OWASP DC)
Application Security 101 (OWASP DC)mikemcbryde
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Michael Hidalgo

Similar a Security testing(20)

Mais de Tabăra de Testare

Zed Attack Proxy (ZAP) Quick Intro - TdT@Cluj #20Zed Attack Proxy (ZAP) Quick Intro - TdT@Cluj #20
Zed Attack Proxy (ZAP) Quick Intro - TdT@Cluj #20Tabăra de Testare
The OWASP Top 10 Most Critical Web App Security Risks - TdT@Cluj #20The OWASP Top 10 Most Critical Web App Security Risks - TdT@Cluj #20
The OWASP Top 10 Most Critical Web App Security Risks - TdT@Cluj #20Tabăra de Testare
Robotium framework & Jenkins CI tools - TdT@Cluj #19Robotium framework & Jenkins CI tools - TdT@Cluj #19
Robotium framework & Jenkins CI tools - TdT@Cluj #19Tabăra de Testare
Tap into mobile app testing@TDT Iasi Sept2013Tap into mobile app testing@TDT Iasi Sept2013
Tap into mobile app testing@TDT Iasi Sept2013Tabăra de Testare
Test analysis & design   good practices@TDT Iasi 17Oct2013Test analysis & design   good practices@TDT Iasi 17Oct2013
Test analysis & design good practices@TDT Iasi 17Oct2013Tabăra de Testare
Webdriver with Thucydides - TdT@Cluj #18Webdriver with Thucydides - TdT@Cluj #18
Webdriver with Thucydides - TdT@Cluj #18Tabăra de Testare

Mais de Tabăra de Testare(20)

Último

royal chess mall-DISCOVER THE 9 BEST ANTIQUE CHESS SETS EVER PRODUCED.pdfroyal chess mall-DISCOVER THE 9 BEST ANTIQUE CHESS SETS EVER PRODUCED.pdf
royal chess mall-DISCOVER THE 9 BEST ANTIQUE CHESS SETS EVER PRODUCED.pdfRoyal Chess Mall
sleeping beautysleeping beauty
sleeping beautyanuretti
Emcee Chaitanya Rathi Profile 2023.pdfEmcee Chaitanya Rathi Profile 2023.pdf
Emcee Chaitanya Rathi Profile 2023.pdfEmcee Chaitanya Rathi
Strade.pptxStrade.pptx
Strade.pptxEmanuele
Colosseo.pptxColosseo.pptx
Colosseo.pptxEmanuele
Jante Sherrod Perosnal Brand .pptxJante Sherrod Perosnal Brand .pptx
Jante Sherrod Perosnal Brand .pptxJanteSherrod

Security testing

Notas do Editor

  1. Security scanner or firewall application “ patch and penetrate” model since 1990 Security in all the phases of SDLC Early detection of bugs; educated devs and qas about security issues, new tools, libraries and languages How much security is needed; PCI DSS; PA DSS Testing from attacker view also
  2. Require accurate documentation of the app; technical specification also Be aware of the used tools limitations Verify every possible section of app logic and all use case scenarios to expose all the vulnerabilities Security team should have the code while performing review to detect vulnerabilities that could be missed during black box testing Metrics; more training is needed; number of issues tracked should go down
  3. Analyze the doc, interview the designers and business owners Av: - early in SDLC; team work; flexible; not supporting technology needed; variety of situations that can be used Disav: time consuming; no supporting doc; requires human thought and skills 2. = risk assesment for the app Av: practical attacker’s view; early in SDLC; flexible Disav: good threat model <> good secure code
  4. XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation and escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites