SlideShare a Scribd company logo
1 of 37
Download to read offline
The Future Of
Automated W b Application
A t   t d Web A li ti
        Testing
              g
Preview

  • Web 1 0
        1.0
      • Application architecture and it’s traditional
        analysis methodology
      • Automated web application testing and it's
        limitation
  • Web 2.0
      • H
        How it works
                  k
      • Challenges and limitation of web 2.0 application
        testing
  • Next generation auditing tool
© net-square
Web 1.0

   Application behavior and it’s
                            it s
traditional analysis methodology
Web 1.0 Application Architecture


                       HTTP             Firewall                 SQL
                      request                                  Database
                     (cleartext
                      or SSL)                      Web app
                                                                  DB
                                                   Web app
   Web                                 Web
   Client                             Server       Web app
                                                                  DB
                                                   Web app

            HTTP reply
             (HTML,
            Javascript,           •Apache      Written in:   Database
             VBscript,            •IIS         •ASP          connection:
               etc)               •Netscape    •JSP          •ADO,
                                   etc…        •Perl, etc    •ODBC, etc.
© net-square
Web 1.0 Application Architecture

  • Works with page refresh
  • Form submitting model
      • Inputs submitted via query string or form
        parameters
  • Browser generates http requests for images,
    js, etc. while rendering html response
    through DOM
  • Request also can be sent by javascript,
    ActiveX, Applets, Flash, etc. directly
© net-square
Web 1.0 Application Architecture

  • Server & Web Application
      • Parses http request and map URL with web
        application physical resource
      • Generates HTML Response based on the
        supplied resource query and input parameters




© net-square
Web 1.0

Traditional Analysis methodology
Traditional Analysis methodology

  • Information gathering
      • Http Response Code – 2xx, 4xx, 5xx
      • Htt contents
        Http    t t
           •   Extract forms and query string parameters.
           •   Hidden fields comments mail ids
                       fields, comments,      ids,
           •   Cookie name / value
           •   Java scripts,
           •   ActiveX and Applets
  • Find injection point suspicious field or query
                   point,
    string parameters
© net-square
Traditional Analysis methodology

  • Manipulate field with malicious characters
    and send request
  • L k at the ht l response, get some clue,
    Look t th html                t        l
    modify parameters and send request.
  • Do same again and again until…. Bingo !!
  • Resources used,  ,
       • Browser
       • Plug-ins (livehttp header or web browser
         Plug ins
         toolbar)
       • Sniffer
© net-square
Web 1.0

Automated web application testing and
     It's Challenges & limitation
Automated web application testing

  • Input – index page or list of stored URLS
  • Configurations – depth, within domain, max
    links, include
    li k i l d / exclude, user-agent, etc.
                      l d               t t
  • Testing methodology
      • Crawls web application recursively and collects
        URLS
      • Find injection point or attack vector for URL
           • Query String parameters
           • It’s Html response form fields
           • Cookie
© net-square
Automated web application testing

  • Popular Web Application Scanners
      • NTObjective’s NTOSpider
      • IBM/W t hfi ’ A S
        IBM/Watchfire’s AppScan
      • HP/SPI Dynamics’ WebInspect


  • Demo
      • NTOInsight



© net-square
It's Challenges & Limitations

  • Building correct attack request
      • Forms submission by “onclick” event
           • Wrong action or target picked up by automated tool


  • Manage context through out the session
      • Logout innocently
  • C
    Crawl a site in certain order – logical action
  • Infinite crawl – Dynamic URL creation

© net-square
It's Challenges & Limitations

  • Executing java script like a Browser
      • Dynamic menus and css
      • URL d
            decryption on th fl b j
                  ti      the fly by java scripts
                                             i t


  • Identify correct attack vector in URL
      • No question mark in a URL
      • Strange extension
      • Custom techniques to supply inputs.

© net-square
It's Challenges & Limitations

  • False positive/negative and duplication
      • Detects vulnerability through http response code
      • O regex pattern search in html response
        Or          tt          h i ht l
  • How to detect persistent XSS??
  • Custom response code (obfuscated 200)
  • Random 404 pages



© net-square
It's Challenges & Limitations

  • Authenticated scanning
      • Login automatically on authenticated URL,
           • Where to go after authentication ?
      • Form based authentication
           • Success or fail how to decide ?
                        fail,
  •   Captcha, how to handle ?
  •   Broken access controls
  •   Information leakage
  •   Design issues
© net-square
Scanners are also getting smarter

  • Page Signature technology being used to
    identify obfuscated 200, random 404 pages
    and Form based authentication
  • Java scripts based URLs can be fetched by
    regex bbased search
                d      h

  • Most of the scanners identify technical
    vulnerabilities like SQL Injection, XSS, etc.
                               j      ,    ,

© net-square
Web 2.0

How it works !!
Web 2.0 Technology

  • Web 2 0 Applications are on the rise
         2.0
  • Rich Internet Applications (RIA) – reshaping
    application front
  • Web Services on the rise – forming backend of
    applications
  • Gartner is advising companies to take up Web
    services now, or risk losing out to competitors
                  ,            g           p
    embracing the technology.



© net-square
Web 2.0 Technology

  • Web Services is forming back end and accessible
    on SOAP
  • AJAX – empowering browsers
  • XML based services
  • Rich Internet Applications are consuming back end
    web services
  • Search engines and mechanisms for web services
    publishing and accessing
  • Security evolving around web services

© net-square
Ajax model
    Classic web application model                                 Ajax-enabled web application model
                                                                                                     Browser
                                                                                          user interface

                                                                                 JavaScript call
                                                                                                   HTML + CSS data
                                Browser
                  user interface                                                           Ajax engine



          HTTP request                                                           HTTP request
                                             Transport layer

                           HTML + CSS data                                                           XML Data



                   web server                                                       web and/or XMLserver


                   Data stores,                                                          Data stores,
               backend processing,                                                   backend processing,
                 legacy systems                                                        legacy systems

           server-side systems                                                     server-side systems
© net-square
                 Source : http://www.adaptivepath.com/publications/essays/archives/000385.php
AJAX introduction

    x




Source : http://www.adaptivepath.com/publications/essays/archives/000385.php
© net-square
Win32 APP vs Web 2.0
    Win32 GUI application model                    Ajax-enabled web application model
                               Desktop                                        Browser
                        Win32 GUI                                user interface

                Win32 Msg                                 JavaScript call
                                   User Data                                HTML + CSS data

                                     Win32
                        WndProc      Msg handler
                                                              AJAX (JS) Library



                 RPC Request                              XHR call


                                   RPC Response                               XML Data



                      RPC Services                               Web Services


                       Data t
                       D t stores,                               Data t
                                                                 D t stores,
                   backend processing,                       backend processing,
                     legacy systems                            legacy systems

© n e t - s q u a r eserver-side   systems                 server-side systems
Web 2.0

Challenges and limitation of web 2 0
                                 2.0
        application testing
Impact of Web 2.0

  • Application Infrastructure

       Changing dimension             Web 1.0
                                          10                       Web 2.0
                                                                       20
       (AI1) Protocols        HTTP & HTTPS               SOAP, XML-RPC, REST etc.
                                                            over HTTP & HTTPS

       (AI2) Information      HTML transfer              XML, JSON, JS Objects etc.
          structures
       (AI3) Communication    Synchronous                Asynchronous & Cross-
          methods
             th d             Postback                      domains (proxy)
                              Refresh and Redirect
       (AI4) Information      Single place information   Multiple sources (Urge for
          sharingg                (No urge for              integrated information
                                  integration)
                                  i       i )               platform)
                                                              l f    )


© net-square
Impact of Web 2.0

  • Security Threats

      Changing dimension
          g g                        Web 1.0                        Web 2.0
    (T1) Entry points      Structured                     Scattered and multiple

    (T2) Dependencies      Limited                        • Multiple technologies
                                                          • Information sources
                                                          • Protocols

    (T3) Vulnerabilities   Server side [Typical injections] • Web services [Payloads]
                                                            • Cli t side [XSS & XSRF]
                                                              Client id

    (T4) Exploitation      Server side exploitation       Both server and client side
                                                          exploitation




© net-square
Impact of Web 2.0

  • Methodology

         Changing dimension            Web 1.0                      Web 2.0
                              Typical with "Host" and
       Footprinting           DNS
                                                          Empowered with search

       Discovery              Simple                      Difficult with hidden calls

       Enumeration            Structured                  Several streams

       Scanning               Structured and simple       Difficult with extensive Ajax

                                                          Difficult with Ajax and web
       Automated attacks      Easy after discovery
                                                          services
                              On the server-side
       Reverse engineering
                 g       g    [Difficult]
                                                          Client-side with Ajax & Flash

       Code reviews           Focus on server-side only   Client-side analysis needed

© net-square
Impact of Web 2.0

  • Countermeasure

        Changing dimension              Web 1.0                       Web 2.0

                                                            Multiple places [Mashups &
       Owner of information   Single place
                                                            RSS]

       Browser security       Simple DOM usage              Complex DOM usage


       Validations            Server side                   Client side [incoming content]


       Logic shift            Only on server                Client side shift

       Secure coding          Structured and single place   Multiple places and scattered


© net-square
Challenges and Limitation

  •   No success with http response parsing
  •   Everything is generated run time
  •   Path of execution is dynamic
  •   Cannot predict next URL
              p
  •   Need to grab data in runtime through DOM
      • cannot use anything other than browser
      • human element is must


© net-square
Future Approach

Automated Web Application Testing
Future Approach

  • "only about half of the required tests for a
     only
    security assessment can be performed on a
    purely automated basis The other half
                       basis.
    require human involvement, typically for
    identifying vulnerabilities in business logic “
                                            logic.
           • Jeremiah Grossman (CTO, Whitehat Security)
  • So finally you need a tool which will have
    So,
    both the things at one place..
      • B
        Browser based W b A li ti S
                b   d Web Application Scanner
© net-square
Future Approach

  • Browser based toolbar Advantages
      • Hybrid – Automated + Manual both
      • U
        Uses BBrowser DOM directly
                             di tl
      • Crawling is possible but it is not required
        because It’s allow you to test per page basis so
                                                  basis,
        test as you traverse normally,
           • Following challenges get resolved
                                      resolved,
               – Infinite crawl
               – Crawl a site in particular order



© net-square
Future Approach

  • Authenticated scanning – login first and then
    start testing, context will be managed
    automatically by browser
      • Following challenges get resolved,
           • Manage context through out the session
           • Logout innocently
           • Where to go after authentication ?
           • Form based authentication, Success or fail, how to
             decide ?
           • Captcha.
© net-square
Future Approach

  • The field value manipulation will be in a
    DOM itself.
      • Following challenges get resolved
                                 resolved,
          –    Building correct attack request
          –    Forms submission by “onclick” event
          –    Wrong action or target picked up by automated tool
          –    Dynamic URL creation
  • Java scripts execution automatically
                           automatically,
     • Following challenges get resolved,
           • Dynamic menus and css
           • URL decryption on the fly by java scripts
© net-square
Future Approach

  • False positive will be reduced by real html
    view,
      • Following challenges get resolved
                                 resolved,
          – False positives
          – XSS detection with no false positives, popup will be there.
          – Information leakage can be identified by html view.




© net-square
Future Approach

  • So only approach is browser based tool i e
    So,                                 tool, i.e
    toolbar, like human clicks and automation
    together!!

  • Security QA Toolbar
     http://www.isecpartners.com/SecurityQAToolbar.html




© net-square
Thanks!!

umesh@net square.com
umesh@net-square com
amish@net-square.com

More Related Content

What's hot

CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsSam Bowne
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Brian Huff
 
Web 2 0 Data Visualization With Jsf
Web 2 0 Data Visualization With JsfWeb 2 0 Data Visualization With Jsf
Web 2 0 Data Visualization With Jsfrajivmordani
 
Java web services soap rest training from hyderabad
Java web services soap rest training from hyderabadJava web services soap rest training from hyderabad
Java web services soap rest training from hyderabadFuturePoint Technologies
 
Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets Redar Ismail
 
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013K.Mohamed Faizal
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulnessDavid Waite
 
Software architectures for the cloud
Software architectures for the cloudSoftware architectures for the cloud
Software architectures for the cloudGeorgios Gousios
 
FatWire Tutorial For Site Studio Developers
FatWire Tutorial For Site Studio DevelopersFatWire Tutorial For Site Studio Developers
FatWire Tutorial For Site Studio DevelopersBrian Huff
 
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechCon
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechConSharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechCon
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechConSPTechCon
 
Turbo Enterprise Web 2.0 Ajax World 20081
Turbo Enterprise Web 2.0 Ajax World 20081Turbo Enterprise Web 2.0 Ajax World 20081
Turbo Enterprise Web 2.0 Ajax World 20081rajivmordani
 
Open Source Identity Management
Open Source Identity ManagementOpen Source Identity Management
Open Source Identity ManagementRadovan Semancik
 
The Path through SharePoint Migrations
The Path through SharePoint MigrationsThe Path through SharePoint Migrations
The Path through SharePoint MigrationsBrian Caauwe
 
Integrating ADF Mobile with WebCenter
Integrating ADF Mobile with WebCenterIntegrating ADF Mobile with WebCenter
Integrating ADF Mobile with WebCenterBrian Huff
 
NoSQLDatabases
NoSQLDatabasesNoSQLDatabases
NoSQLDatabasesAdi Challa
 
WebCenter Content & Portal Methodology Deep Dive with Case Studies
WebCenter Content & Portal Methodology Deep Dive with Case StudiesWebCenter Content & Portal Methodology Deep Dive with Case Studies
WebCenter Content & Portal Methodology Deep Dive with Case StudiesBrian Huff
 
Open Source & Identity Management
Open Source & Identity ManagementOpen Source & Identity Management
Open Source & Identity ManagementJISC Netskills
 
Top 10 HTML5 Features for Oracle Cloud Developers
Top 10 HTML5 Features for Oracle Cloud DevelopersTop 10 HTML5 Features for Oracle Cloud Developers
Top 10 HTML5 Features for Oracle Cloud DevelopersBrian Huff
 
HTML5 and Timed Media Playback
HTML5 and Timed Media PlaybackHTML5 and Timed Media Playback
HTML5 and Timed Media PlaybackSidra Abbasi
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)Sam Bowne
 

What's hot (20)

CNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side ControlsCNIT 129S: Ch 5: Bypassing Client-Side Controls
CNIT 129S: Ch 5: Bypassing Client-Side Controls
 
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
Top 10 Ways To Integrate With Oracle Enterprise Content Management (ECM)
 
Web 2 0 Data Visualization With Jsf
Web 2 0 Data Visualization With JsfWeb 2 0 Data Visualization With Jsf
Web 2 0 Data Visualization With Jsf
 
Java web services soap rest training from hyderabad
Java web services soap rest training from hyderabadJava web services soap rest training from hyderabad
Java web services soap rest training from hyderabad
 
Portal and Intranets
Portal and Intranets Portal and Intranets
Portal and Intranets
 
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
Deep Dive into SharePoint Topologies and Server Architecture for SharePoint 2013
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulness
 
Software architectures for the cloud
Software architectures for the cloudSoftware architectures for the cloud
Software architectures for the cloud
 
FatWire Tutorial For Site Studio Developers
FatWire Tutorial For Site Studio DevelopersFatWire Tutorial For Site Studio Developers
FatWire Tutorial For Site Studio Developers
 
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechCon
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechConSharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechCon
SharePoint Data Anywhere and Everywhere by Chris Beckett - SPTechCon
 
Turbo Enterprise Web 2.0 Ajax World 20081
Turbo Enterprise Web 2.0 Ajax World 20081Turbo Enterprise Web 2.0 Ajax World 20081
Turbo Enterprise Web 2.0 Ajax World 20081
 
Open Source Identity Management
Open Source Identity ManagementOpen Source Identity Management
Open Source Identity Management
 
The Path through SharePoint Migrations
The Path through SharePoint MigrationsThe Path through SharePoint Migrations
The Path through SharePoint Migrations
 
Integrating ADF Mobile with WebCenter
Integrating ADF Mobile with WebCenterIntegrating ADF Mobile with WebCenter
Integrating ADF Mobile with WebCenter
 
NoSQLDatabases
NoSQLDatabasesNoSQLDatabases
NoSQLDatabases
 
WebCenter Content & Portal Methodology Deep Dive with Case Studies
WebCenter Content & Portal Methodology Deep Dive with Case StudiesWebCenter Content & Portal Methodology Deep Dive with Case Studies
WebCenter Content & Portal Methodology Deep Dive with Case Studies
 
Open Source & Identity Management
Open Source & Identity ManagementOpen Source & Identity Management
Open Source & Identity Management
 
Top 10 HTML5 Features for Oracle Cloud Developers
Top 10 HTML5 Features for Oracle Cloud DevelopersTop 10 HTML5 Features for Oracle Cloud Developers
Top 10 HTML5 Features for Oracle Cloud Developers
 
HTML5 and Timed Media Playback
HTML5 and Timed Media PlaybackHTML5 and Timed Media Playback
HTML5 and Timed Media Playback
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
 

Viewers also liked

Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...ClubHack
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreClubHack
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can Judy O'Connell
 

Viewers also liked (8)

Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can The Next Big Thing is Web 3.0. Catch It If You Can
The Next Big Thing is Web 3.0. Catch It If You Can
 

Similar to Amish Umesh - Future Of Web App Testing - ClubHack2007

Shreeraj - Hacking Web 2 0 - ClubHack2007
Shreeraj - Hacking Web 2 0 - ClubHack2007Shreeraj - Hacking Web 2 0 - ClubHack2007
Shreeraj - Hacking Web 2 0 - ClubHack2007ClubHack
 
6 weeks 6 months live project summer industrial training in cmc limited 2012
6 weeks  6 months live project summer industrial training in cmc limited  20126 weeks  6 months live project summer industrial training in cmc limited  2012
6 weeks 6 months live project summer industrial training in cmc limited 2012CMC Limited
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworksukdpe
 
Building dynamic applications with the share point client object model
Building dynamic applications with the share point client object modelBuilding dynamic applications with the share point client object model
Building dynamic applications with the share point client object modelEric Shupps
 
Effectively using Nokia Web Tools 2.0 templates for Series 40 web apps
Effectively using Nokia Web Tools 2.0 templates for Series 40 web appsEffectively using Nokia Web Tools 2.0 templates for Series 40 web apps
Effectively using Nokia Web Tools 2.0 templates for Series 40 web appsMicrosoft Mobile Developer
 
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...Joonas Lehtinen
 
Restful风格ž„web服务架构
Restful风格ž„web服务架构Restful风格ž„web服务架构
Restful风格ž„web服务架构Benjamin Tan
 
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...jaxconf
 
HTML5 Programming
HTML5 ProgrammingHTML5 Programming
HTML5 Programminghotrannam
 
SharePoint Saturday The Conference DC - How the client object model saved the...
SharePoint Saturday The Conference DC - How the client object model saved the...SharePoint Saturday The Conference DC - How the client object model saved the...
SharePoint Saturday The Conference DC - How the client object model saved the...Liam Cleary [MVP]
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web AppsKranthi Lakum
 
Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecuritySanjeev Verma, PhD
 
Social Photos - My presentation at Microsoft Tech Day
Social Photos - My presentation at Microsoft Tech DaySocial Photos - My presentation at Microsoft Tech Day
Social Photos - My presentation at Microsoft Tech DayTechMaster Vietnam
 
Application Security Workshop
Application Security Workshop Application Security Workshop
Application Security Workshop Priyanka Aash
 
Web Application Frameworks (WAF)
Web Application Frameworks (WAF)Web Application Frameworks (WAF)
Web Application Frameworks (WAF)Ako Kaman
 
HTML5: An Overview
HTML5: An OverviewHTML5: An Overview
HTML5: An OverviewNagendra Um
 

Similar to Amish Umesh - Future Of Web App Testing - ClubHack2007 (20)

Shreeraj - Hacking Web 2 0 - ClubHack2007
Shreeraj - Hacking Web 2 0 - ClubHack2007Shreeraj - Hacking Web 2 0 - ClubHack2007
Shreeraj - Hacking Web 2 0 - ClubHack2007
 
6 weeks 6 months live project summer industrial training in cmc limited 2012
6 weeks  6 months live project summer industrial training in cmc limited  20126 weeks  6 months live project summer industrial training in cmc limited  2012
6 weeks 6 months live project summer industrial training in cmc limited 2012
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
 
Building dynamic applications with the share point client object model
Building dynamic applications with the share point client object modelBuilding dynamic applications with the share point client object model
Building dynamic applications with the share point client object model
 
Effectively using Nokia Web Tools 2.0 templates for Series 40 web apps
Effectively using Nokia Web Tools 2.0 templates for Series 40 web appsEffectively using Nokia Web Tools 2.0 templates for Series 40 web apps
Effectively using Nokia Web Tools 2.0 templates for Series 40 web apps
 
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...
Vaadin - Rich Web Applications in Server-side Java without Plug-ins or JavaSc...
 
Restful风格ž„web服务架构
Restful风格ž„web服务架构Restful风格ž„web服务架构
Restful风格ž„web服务架构
 
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...
Vaadin, Rich Web Apps in Server-Side Java without Plug-ins or JavaScript: Joo...
 
HTML5 Programming
HTML5 ProgrammingHTML5 Programming
HTML5 Programming
 
SharePoint Saturday The Conference DC - How the client object model saved the...
SharePoint Saturday The Conference DC - How the client object model saved the...SharePoint Saturday The Conference DC - How the client object model saved the...
SharePoint Saturday The Conference DC - How the client object model saved the...
 
Webapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh guptaWebapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh gupta
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web Apps
 
Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser Security
 
Social Photos - My presentation at Microsoft Tech Day
Social Photos - My presentation at Microsoft Tech DaySocial Photos - My presentation at Microsoft Tech Day
Social Photos - My presentation at Microsoft Tech Day
 
Asp.net
Asp.netAsp.net
Asp.net
 
Application Security Workshop
Application Security Workshop Application Security Workshop
Application Security Workshop
 
Web Application Frameworks (WAF)
Web Application Frameworks (WAF)Web Application Frameworks (WAF)
Web Application Frameworks (WAF)
 
Basics of the Web Platform
Basics of the Web PlatformBasics of the Web Platform
Basics of the Web Platform
 
Web applications
Web applicationsWeb applications
Web applications
 
HTML5: An Overview
HTML5: An OverviewHTML5: An Overview
HTML5: An Overview
 

More from ClubHack

Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalClubHack
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaClubHack
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiClubHack
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)ClubHack
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)ClubHack
 
Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)ClubHack
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)ClubHack
 
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)ClubHack
 
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)ClubHack
 

More from ClubHack (20)

Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 
One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)One link Facebook (Anand Pandey)
One link Facebook (Anand Pandey)
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 
Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)Mere Paas Teensy Hai (Nikhil Mittal)
Mere Paas Teensy Hai (Nikhil Mittal)
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
 
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
 
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
Dom XSS - Encounters of the 3rd Kind (Bishan Singh Kochher)
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Amish Umesh - Future Of Web App Testing - ClubHack2007

  • 1. The Future Of Automated W b Application A t t d Web A li ti Testing g
  • 2. Preview • Web 1 0 1.0 • Application architecture and it’s traditional analysis methodology • Automated web application testing and it's limitation • Web 2.0 • H How it works k • Challenges and limitation of web 2.0 application testing • Next generation auditing tool © net-square
  • 3. Web 1.0 Application behavior and it’s it s traditional analysis methodology
  • 4. Web 1.0 Application Architecture HTTP Firewall SQL request Database (cleartext or SSL) Web app DB Web app Web Web Client Server Web app DB Web app HTTP reply (HTML, Javascript, •Apache Written in: Database VBscript, •IIS •ASP connection: etc) •Netscape •JSP •ADO, etc… •Perl, etc •ODBC, etc. © net-square
  • 5. Web 1.0 Application Architecture • Works with page refresh • Form submitting model • Inputs submitted via query string or form parameters • Browser generates http requests for images, js, etc. while rendering html response through DOM • Request also can be sent by javascript, ActiveX, Applets, Flash, etc. directly © net-square
  • 6. Web 1.0 Application Architecture • Server & Web Application • Parses http request and map URL with web application physical resource • Generates HTML Response based on the supplied resource query and input parameters © net-square
  • 8. Traditional Analysis methodology • Information gathering • Http Response Code – 2xx, 4xx, 5xx • Htt contents Http t t • Extract forms and query string parameters. • Hidden fields comments mail ids fields, comments, ids, • Cookie name / value • Java scripts, • ActiveX and Applets • Find injection point suspicious field or query point, string parameters © net-square
  • 9. Traditional Analysis methodology • Manipulate field with malicious characters and send request • L k at the ht l response, get some clue, Look t th html t l modify parameters and send request. • Do same again and again until…. Bingo !! • Resources used, , • Browser • Plug-ins (livehttp header or web browser Plug ins toolbar) • Sniffer © net-square
  • 10. Web 1.0 Automated web application testing and It's Challenges & limitation
  • 11. Automated web application testing • Input – index page or list of stored URLS • Configurations – depth, within domain, max links, include li k i l d / exclude, user-agent, etc. l d t t • Testing methodology • Crawls web application recursively and collects URLS • Find injection point or attack vector for URL • Query String parameters • It’s Html response form fields • Cookie © net-square
  • 12. Automated web application testing • Popular Web Application Scanners • NTObjective’s NTOSpider • IBM/W t hfi ’ A S IBM/Watchfire’s AppScan • HP/SPI Dynamics’ WebInspect • Demo • NTOInsight © net-square
  • 13. It's Challenges & Limitations • Building correct attack request • Forms submission by “onclick” event • Wrong action or target picked up by automated tool • Manage context through out the session • Logout innocently • C Crawl a site in certain order – logical action • Infinite crawl – Dynamic URL creation © net-square
  • 14. It's Challenges & Limitations • Executing java script like a Browser • Dynamic menus and css • URL d decryption on th fl b j ti the fly by java scripts i t • Identify correct attack vector in URL • No question mark in a URL • Strange extension • Custom techniques to supply inputs. © net-square
  • 15. It's Challenges & Limitations • False positive/negative and duplication • Detects vulnerability through http response code • O regex pattern search in html response Or tt h i ht l • How to detect persistent XSS?? • Custom response code (obfuscated 200) • Random 404 pages © net-square
  • 16. It's Challenges & Limitations • Authenticated scanning • Login automatically on authenticated URL, • Where to go after authentication ? • Form based authentication • Success or fail how to decide ? fail, • Captcha, how to handle ? • Broken access controls • Information leakage • Design issues © net-square
  • 17. Scanners are also getting smarter • Page Signature technology being used to identify obfuscated 200, random 404 pages and Form based authentication • Java scripts based URLs can be fetched by regex bbased search d h • Most of the scanners identify technical vulnerabilities like SQL Injection, XSS, etc. j , , © net-square
  • 18. Web 2.0 How it works !!
  • 19. Web 2.0 Technology • Web 2 0 Applications are on the rise 2.0 • Rich Internet Applications (RIA) – reshaping application front • Web Services on the rise – forming backend of applications • Gartner is advising companies to take up Web services now, or risk losing out to competitors , g p embracing the technology. © net-square
  • 20. Web 2.0 Technology • Web Services is forming back end and accessible on SOAP • AJAX – empowering browsers • XML based services • Rich Internet Applications are consuming back end web services • Search engines and mechanisms for web services publishing and accessing • Security evolving around web services © net-square
  • 21. Ajax model Classic web application model Ajax-enabled web application model Browser user interface JavaScript call HTML + CSS data Browser user interface Ajax engine HTTP request HTTP request Transport layer HTML + CSS data XML Data web server web and/or XMLserver Data stores, Data stores, backend processing, backend processing, legacy systems legacy systems server-side systems server-side systems © net-square Source : http://www.adaptivepath.com/publications/essays/archives/000385.php
  • 22. AJAX introduction x Source : http://www.adaptivepath.com/publications/essays/archives/000385.php © net-square
  • 23. Win32 APP vs Web 2.0 Win32 GUI application model Ajax-enabled web application model Desktop Browser Win32 GUI user interface Win32 Msg JavaScript call User Data HTML + CSS data Win32 WndProc Msg handler AJAX (JS) Library RPC Request XHR call RPC Response XML Data RPC Services Web Services Data t D t stores, Data t D t stores, backend processing, backend processing, legacy systems legacy systems © n e t - s q u a r eserver-side systems server-side systems
  • 24. Web 2.0 Challenges and limitation of web 2 0 2.0 application testing
  • 25. Impact of Web 2.0 • Application Infrastructure Changing dimension Web 1.0 10 Web 2.0 20 (AI1) Protocols HTTP & HTTPS SOAP, XML-RPC, REST etc. over HTTP & HTTPS (AI2) Information HTML transfer XML, JSON, JS Objects etc. structures (AI3) Communication Synchronous Asynchronous & Cross- methods th d Postback domains (proxy) Refresh and Redirect (AI4) Information Single place information Multiple sources (Urge for sharingg (No urge for integrated information integration) i i ) platform) l f ) © net-square
  • 26. Impact of Web 2.0 • Security Threats Changing dimension g g Web 1.0 Web 2.0 (T1) Entry points Structured Scattered and multiple (T2) Dependencies Limited • Multiple technologies • Information sources • Protocols (T3) Vulnerabilities Server side [Typical injections] • Web services [Payloads] • Cli t side [XSS & XSRF] Client id (T4) Exploitation Server side exploitation Both server and client side exploitation © net-square
  • 27. Impact of Web 2.0 • Methodology Changing dimension Web 1.0 Web 2.0 Typical with "Host" and Footprinting DNS Empowered with search Discovery Simple Difficult with hidden calls Enumeration Structured Several streams Scanning Structured and simple Difficult with extensive Ajax Difficult with Ajax and web Automated attacks Easy after discovery services On the server-side Reverse engineering g g [Difficult] Client-side with Ajax & Flash Code reviews Focus on server-side only Client-side analysis needed © net-square
  • 28. Impact of Web 2.0 • Countermeasure Changing dimension Web 1.0 Web 2.0 Multiple places [Mashups & Owner of information Single place RSS] Browser security Simple DOM usage Complex DOM usage Validations Server side Client side [incoming content] Logic shift Only on server Client side shift Secure coding Structured and single place Multiple places and scattered © net-square
  • 29. Challenges and Limitation • No success with http response parsing • Everything is generated run time • Path of execution is dynamic • Cannot predict next URL p • Need to grab data in runtime through DOM • cannot use anything other than browser • human element is must © net-square
  • 30. Future Approach Automated Web Application Testing
  • 31. Future Approach • "only about half of the required tests for a only security assessment can be performed on a purely automated basis The other half basis. require human involvement, typically for identifying vulnerabilities in business logic “ logic. • Jeremiah Grossman (CTO, Whitehat Security) • So finally you need a tool which will have So, both the things at one place.. • B Browser based W b A li ti S b d Web Application Scanner © net-square
  • 32. Future Approach • Browser based toolbar Advantages • Hybrid – Automated + Manual both • U Uses BBrowser DOM directly di tl • Crawling is possible but it is not required because It’s allow you to test per page basis so basis, test as you traverse normally, • Following challenges get resolved resolved, – Infinite crawl – Crawl a site in particular order © net-square
  • 33. Future Approach • Authenticated scanning – login first and then start testing, context will be managed automatically by browser • Following challenges get resolved, • Manage context through out the session • Logout innocently • Where to go after authentication ? • Form based authentication, Success or fail, how to decide ? • Captcha. © net-square
  • 34. Future Approach • The field value manipulation will be in a DOM itself. • Following challenges get resolved resolved, – Building correct attack request – Forms submission by “onclick” event – Wrong action or target picked up by automated tool – Dynamic URL creation • Java scripts execution automatically automatically, • Following challenges get resolved, • Dynamic menus and css • URL decryption on the fly by java scripts © net-square
  • 35. Future Approach • False positive will be reduced by real html view, • Following challenges get resolved resolved, – False positives – XSS detection with no false positives, popup will be there. – Information leakage can be identified by html view. © net-square
  • 36. Future Approach • So only approach is browser based tool i e So, tool, i.e toolbar, like human clicks and automation together!! • Security QA Toolbar http://www.isecpartners.com/SecurityQAToolbar.html © net-square