A common misconception is that all security testing is complicated. While some testing certainly requires learning new skills and understanding things like networks, IP addresses, and domain names, other testing is extremely simple. Today we’re going to talk about three security flaws you can find in an application by simply using your browser’s developer tools. […]
Author: kristinjackvony
How to Craft a Union SQL Injection Attack
Last week, we learned how to craft a basic SQL injection attack. This week, we’ll learn how to do something more elaborate. We are going to use a simple search request to get a database to show us all of the records in a table of users! It’s important to know how to craft attacks […]
Introduction to SQL Injection
SQL Injection is another type of security attack that can do serious damage to your application. It’s important to find SQL Injection vulnerabilities before a malicious user does. In SQL Injection, a malicious user sends in a SQL query through a form field which interacts with the database in an unexpected way. Here are four […]
Automated Testing For XSS
Last week, we talked about three different ways to test for Cross-Site scripting. We looked at examples of manual XSS testing, and talked about how to use the code to formulate XSS attacks. Today we will look at the third way to test, which is to use automation. For today’s testing, we’ll be using Burp […]
Three Ways to Test for Cross-Site Scripting
Last week, we explained what Cross-Site Scripting (XSS) is and demonstrated a couple of examples. But knowing what it is isn’t enough- we need to able to verify that our application is not vulnerable to XSS attacks! Today we’ll discuss three different strategies to test for XSS. Strategy One: Manual Black-Box TestingThis is the strategy […]
What is Cross-Site Scripting, and Why Should You Care?
In discussions about security testing, you have probably heard about Cross-Site Scripting (XSS), but you may not have a good definition of what it is. Cross-Site Scripting is an attack in which a malicious user finds a way to execute a script on another user’s website. Today we’ll learn about two different kinds of XSS […]
Testing for IDOR Vulnerabilities
In this week’s post, we will learn how to test for IDOR. IDOR stands for Insecure Direct Object Reference, and it refers to a situation when a user can successfully request access to a webpage, a data object, or a file that they should not have access to. We’ll discuss four different ways this vulnerability […]
Introduction to Security Testing
Until a few years ago, security testing was seen as something separate from QA; something that an InfoSec team would take care of. But massive data breaches have demonstrated that security is everyone’s responsibility, from CEOs to product owners, from DBAs to developers, and yes, to software testers. Testers already verify that software is working […]
Understanding JSON Data
New API testers will often be mystified by the assortment of curly braces, colons, and commas that they see in the body of the response to their GET requests. Trying to create a valid JSON body for a POST request is even more puzzling. In this week’s post, I’ll discuss how JSON data is formed […]
What API Tests to Automate, and When to Automate Them
Last week, we talked about running API tests from the command line using Newman, and how to add Newman into your Continuous Integration system so that your API tests run automatically. But knowing how to run your tests isn’t that helpful unless you make good choices about what tests to run, and when to run […]