SlideShare a Scribd company logo
BRINGING THE HACKER
MINDSET INTO
REQUIREMENTS AND
TESTING
Jason Petry
Eapen Thomas
Nationwide Insurance
AGENDA
 How bad is our application security? Why are we so bad at securing our
applications?
 An example application: money transferring application
 2 Views of Quality – Producer vs. Consumer
 Why are security requirements so hard?
 Tools to aid requirements and test analysts
 Threat Models
 Attack trees
 Securing our applications is getting more challenging
 Call to action
2
YOUR PERSONAL INFO IS PUBLIC
3Source: Symantec Internet Security Threat Report
A New Zero-Day Vulnerability Was Discovered
on Average Each Week in 2015
 Advanced attack groups continue to profit from
previously undiscovered flaws in browsers and
website plugins
Over Half a Billion Personal Records Were
Stolen or Lost in 2015
Major Security Vulnerabilities in Three
Quarters of Popular Websites Put Us All at Risk
 Web administrators still struggle to stay current on
patches
MOBILE VULNERABILITIES ARE OFF THE CHART
4Source: Symantec Internet Security Threat Report
Android users willingly downloaded over two billion
malicious mobile applications last year
Source: http://www.itproportal.com/2016/02/26/smartphone-users-still-taking-cavalier-approach-mobile-security/
Nearly 25 percent of mobile apps contain at least one
high-risk security flaw
An average mobile device connects to 160 different IP
addresses daily
35 percent of mobile device communications are
unencrypted
There is a 50 percent greater chance that games
include a high-risk vulnerability than the average app.
SOME SCARY INDUSTRY NUMBERS
84% of cyber attacks are happening at the application layer
Source: Forbes / SAP (March 2015)
98% of applications scanned by Trustwave harbored one or more security
vulnerabilities. Meanwhile, the median number of vulnerabilities was 20 - up
from six the year prior.
Source: 2015 Trustwave Global Security Report
Exploiting many of these application vulnerabilities is “VERY EASY”
5
SECURITY VS FUNCTIONAL RQRMTS & TESTING
 Security requirements and testing is different from functional
requirements & testing.
 In security testing the goal is to find out if the system can stand up to
abusers. Negative tests are critical.
 Security test scenarios may not be realistic from a common user
standpoint . Especially when considering web applications, attackers may
interact with the application in critically different ways compared to
regular users.
 Anticipating and planning for these scenarios is vital for security testing
 Security requirements and testing requires an adversarial mindset, a
"what if" mindset, i.e., the same one hackers use to break systems.
6
EXAMPLE REQUIREMENT STORY
Cyclone Transfers – A Pay-pal like service.
“As a logged in customer, I can transfer money, so that I move
money from one of my accounts to another customer’s
account.”
Acceptance Criteria:
 The amount of money I transfer must be less than the amount of
money available.
 All amounts are in US Dollars.
 Transfers may be for fractions of a penny.
7
DEMO
8
WHAT IS QUALITY?
What are the two views of Quality?
The producer view and the customer view.
The producer view of quality: a product is a quality product if it
meets or conforms to the product requirements. This statement is
usually shortened to: quality means meets requirements.
The customer view of quality: fit for use; the product or service
meets the customer’s needs regardless of the requirements
9
THE PRODUCER VIEW OF QUALITY
Ok, so, what is the problem?
 We don’t have much/any application security requirements (this is an
industry wide problem)
 To create good security requirements, the analyst should review
(Organizational requirements, Privacy requirements, statutory requirements
and industry requirements)
 Organizational security policies and standards
 Org privacy policies
 Regulatory requirements (Sarbanes-Oxley, HIPAA etc.)
 Other standards such as PCI DSS, ANSI-X9 for banks etc.
 What is the solution? The requirements analysts have to be Creative
10
CUSTOMER VIEW OF QUALITY
Let’s now switch to the customer view of quality
Oops! We have a bigger problem!
To the customer, a product is a quality product if it meets the
customer’s needs, regardless of whether the requirements were met.
 We have to go beyond requirements (even if we have some security
requirements).
 For this, we definitely have to be creative, requires an adversarial
mindset
 We talk about some resources from OWASP and other organizations
that can help
11
TESTERS HAVE TO BE CREATIVE
Test analysts should be creative in the absence of good security
requirements:
Automated web application security testing tools can help
Explore & Discover – Exploratory testing comes handy
Use Common Sense & Experience - common knowledge that
comes from experience
Discussions, Emails and Meeting Notes
Create and review the high level test scenarios with the business
12
OWASP TOP 10
When we talk about web application vulnerabilities, we have to talk about Open Web
Application Security Project (OWASP) Top 10 vulnerabilities.
Please note: this is “a” list, not the exhaustive list of all possible web application
vulnerabilities (there are hundreds of them)
13
CURE FOR MOST PROBLEMS: INPUT VALIDATION
Many vulnerabilities are exploited by injecting malicious commands/code through
input forms
TYPE
 Always check the data type of the input and make sure it matches the expected data type. For example,
if there is an input box which accepts numeric data and the letter ‘O’ is typed instead of the number
zero, it should not be accepted.
LENGTH
 Always check that the data lies within the acceptable range of lengths for the values expected. For
example, a zip code field will be either 5 or 10 (dashes included) digits in length. If nothing is entered, or
if 11 or more digits are entered, it should not be accepted.
FORMAT
 Always check that data is in a specified format. For example, dates should be in a specific format (such
as MM/DD/YYYY). If it is not in the correct format, it should not be accepted.
RANGE
 Always check that data lies within a specified range of values. For example, the month of a person’s date
of birth should lie between 1 and 12. If it does not fall within that range, it should not be accepted.
14
THREAT MODELLING
“Threat modeling is about using models to find security
problems.” – Adam Shostack, Threat Modeling: Designing for
Security
“Coming up with a set of possible attacks you plan to protect
against” – Electronic Frontier Foundation
(https://ssd.eff.org/en/glossary/threat-model)
15
THREAT MODELLING EXAMPLE
May be many Data Flow
Diagrams (DFD’s) for one
application/process, at
varying levels of detail.
THREAT MODELLING
Can be done with varying levels of formality, and
with different focuses; method adopted should
be tailored to specific application need.
One Common Methodology is Microsoft’s STRIDE model.
 Model: decompose the application as a data flow diagram (DFD) to
drive the overall risk analysis process.
 Identify: In the next step, threats to the modeled system are
identified and enumerated
 Mitigate: After threats have been identified, mitigations to those
threats are selected
 Validate: Implement tests to validate threat is mitigated.
Spoofing: Impersonating something or
someone else
Tampering: Modifying data or code
Repudiation: Claiming to have not performed
an action
Information Disclosure: Exposing information
to someone not authorized to see it
Denial of Service: Deny or degrade service to
users
Elevation of Privilege: Gain capabilities
without proper authorization
Steal
someone’s
account
Trick someone
into giving me
money
Enter a
negative
number for a
transfer I make
ATTACK TREES
Get someone
else to give me
money
Fool the system
into giving me
money
Get Funds
Transferred to
me with no
work.
18
NEGATIVE TEST EXAMPLES
#1 Test: The Single Quote: '
 Helpful to make sure SQL injection attacks have been properly
mitigated against
 Also useful for ensuring anti-SQL injection protections properly
deal with single quote characters in user data.
19
EXAMPLE SINGLE QUOTE TEST
Cyclone Transfers: Test Procedure
 Login
 Go to all users.
 Use Search function to find abcdef
 Use Search function to find O’Brian
Expected result: No users found same results for both
Actual Result: Error Message in second case.
20
NEGATIVE TEST CASE: HTML CONTENT
Another important test case: Allowing entry of HTML input,
and properly displaying the result. (i.e., as text)
Cross-Site Scripting is the single most commonly
encountered security issue in web applications.
21
EXAMPLE HTML CONTENT TEST
Cyclone Transfers: Test Procedure
 Click on Sign In, then Sign Up.
 Create new account, in Profile Statement section include following
content: <script>alert(123)</script>
 Log in a different user, go to all users and search for newly created
user.
Expected Result: Profile Statement is displayed in search
results as typed above.
Actual Result: Alert Box Created.
22
NEGATIVE TEST CASE: DIRECT OBJECT ACCESS
If URL’s to content are static, ensure that user’s cannot
access other users’ content.
Unlike previous two cases, very difficult for multi-purpose
scanner tools to detect and respond; requires knowledge of
the application and data access rules.
23
EXAMPLE DIRECT OBJECT ACCESS
Cyclone Transfers: Test Procedures
 Create New User, as in last Test
 In New User, add account, and upload test PDF as “Bank
Statement”.
 Click on link to uploaded PDF to validate. Create Bookmark to PDF.
 Log in a different account, use bookmark to go to PDF
 Expected Result: Access should be denied.
 Actual Result: PDF Displayed
24
THE RUGGED MANIFESTO
HTTPS://WWW.RUGGEDSOFTWARE.ORG/
I am rugged and, more importantly, my code is rugged.
I recognize that software has become a foundation of our modern world.
I recognize the awesome responsibility that comes with this foundational role.
I recognize that my code will be used in ways I cannot anticipate, in ways it was
not designed, and for longer than it was ever intended.
I recognize that my code will be attacked by talented and persistent adversaries
who threaten our physical, economic and national security.
I recognize these things – and I choose to be rugged.
I am rugged because I refuse to be a source of vulnerability or weakness.
I am rugged because I assure my code will support its mission.
I am rugged because my code can face these challenges and persist in spite of
them.
I am rugged, not because it is easy, but because it is necessary and I am up for the
challenge.
25
THINGS ARE NOT GETTING ANY EASIER
Things are not getting any easier, they are
getting really complicated, very fast
 Human beings are still the weakest link
 Ballooning attack surface
The number of Mobile devices are growing, mobile apps
are getting very functional/complicated
Internet of things is making application security more
difficult with the amount of interconnected devices
26
CALL TO ACTION
Don’t be left behind, security requirements elicitation &
testing skills are essential, not optional
A skill you must have to be competitive/marketable/just to
survive
Get trained, get competent in software security
requirements elicitation techniques & security testing
techniques
 Resources are lacking
 Conferences that cater to analysts, have no tracks or have very few
tracks on application security requirement/testing
27
RESOURCES
 OWASP
https://www.owasp.org
 OWASP Testing Guide (200+ page PDF document is free to download)
https://www.owasp.org/index.php/OWASP_Testing_Project
 OWASP Application Security Verification Standard 3.0
https://www.owasp.org/images/6/67/OWASPApplicationSecurityVerificationStandard3.0.pdf
 OWASP Broken Web Application Project
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
 SANS SWAT checklist
https://software-security.sans.org/resources/swat
 Microsoft SDL Threat Modeling Tool
https://www.microsoft.com/en-us/download/confirmation.aspx?id=49168
28
THANK YOU!
If you would like to contact us:
Jason Petry (petryj2@nationwide.com)
Eapen Thomas (eapen@nationwide.com)
29

More Related Content

What's hot

Software testing lecture notes
Software testing  lecture notesSoftware testing  lecture notes
Software testing lecture notes
TEJVEER SINGH
 
Application Security Risk Rating
Application Security Risk RatingApplication Security Risk Rating
Application Security Risk Rating
Vaibhav Gupta
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
Sonatype
 
Continuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain ApproachContinuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain Approach
Sonatype
 
EuroSPI 2016 - Software Safety and Security Through Standards
EuroSPI 2016 - Software Safety and Security Through StandardsEuroSPI 2016 - Software Safety and Security Through Standards
EuroSPI 2016 - Software Safety and Security Through Standards
Arthur Hicken
 
Accelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain ManagementAccelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain Management
Sonatype
 
Rx for FDA Software Compliance
Rx for FDA Software ComplianceRx for FDA Software Compliance
Rx for FDA Software Compliance
Parasoft
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
jothisekaran
 
[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs
bugcrowd
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
bugcrowd
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Sonatype
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the things
Jerod Brennen
 
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Sonatype
 
Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software Development
Sonatype
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey Results
Tim Mackey
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
bugcrowd
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ryan Faircloth
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Sonatype
 
Future Of Software Testing
Future Of Software TestingFuture Of Software Testing
Future Of Software Testing
99tests
 

What's hot (20)

Software testing lecture notes
Software testing  lecture notesSoftware testing  lecture notes
Software testing lecture notes
 
Application Security Risk Rating
Application Security Risk RatingApplication Security Risk Rating
Application Security Risk Rating
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
 
Continuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain ApproachContinuous Acceleration with a Software Supply Chain Approach
Continuous Acceleration with a Software Supply Chain Approach
 
EuroSPI 2016 - Software Safety and Security Through Standards
EuroSPI 2016 - Software Safety and Security Through StandardsEuroSPI 2016 - Software Safety and Security Through Standards
EuroSPI 2016 - Software Safety and Security Through Standards
 
Accelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain ManagementAccelerating Innovation with Software Supply Chain Management
Accelerating Innovation with Software Supply Chain Management
 
Rx for FDA Software Compliance
Rx for FDA Software ComplianceRx for FDA Software Compliance
Rx for FDA Software Compliance
 
Software Testing Fundamentals
Software Testing FundamentalsSoftware Testing Fundamentals
Software Testing Fundamentals
 
[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs[Webinar] The Art & Value of Bug Bounty Programs
[Webinar] The Art & Value of Bug Bounty Programs
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI ComplianceTools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the things
 
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
 
Supply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software DevelopmentSupply Chain Solutions for Modern Software Development
Supply Chain Solutions for Modern Software Development
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Open Source 360 Survey Results
Open Source 360 Survey ResultsOpen Source 360 Survey Results
Open Source 360 Survey Results
 
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
3 Reasons to Swap Your Next Pen Test With a Bug Bounty Program
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
 
Future Of Software Testing
Future Of Software TestingFuture Of Software Testing
Future Of Software Testing
 

Viewers also liked

Testing and checking by Newton Olivieri
Testing and checking by Newton OlivieriTesting and checking by Newton Olivieri
Testing and checking by Newton Olivieri
QA or the Highway
 
What to do with the problems you cannot solve?
What to do with the problems you cannot solve?What to do with the problems you cannot solve?
What to do with the problems you cannot solve?
SQALab
 
Page object from the ground up by Joe Beale
Page object from the ground up by Joe BealePage object from the ground up by Joe Beale
Page object from the ground up by Joe Beale
QA or the Highway
 
Defect Triage by Matt Eakin
Defect Triage by Matt EakinDefect Triage by Matt Eakin
Defect Triage by Matt Eakin
QA or the Highway
 
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
QA or the Highway
 
Curating Your Cukes by Eric Kessler
Curating Your Cukes by Eric KesslerCurating Your Cukes by Eric Kessler
Curating Your Cukes by Eric Kessler
QA or the Highway
 
The psychology of testing
The psychology of testingThe psychology of testing
The psychology of testing
Vaibhav Dash
 
How to deal with bad requirements of software
How to deal with bad requirements of softwareHow to deal with bad requirements of software
How to deal with bad requirements of software
BugRaptors
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
SQALab
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based TestingJeff Findlay
 
Improving Test Team Throughput via Architecture by Dustin Williams
Improving Test Team Throughput via Architecture by Dustin WilliamsImproving Test Team Throughput via Architecture by Dustin Williams
Improving Test Team Throughput via Architecture by Dustin Williams
QA or the Highway
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsReuben Korngold
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
Johan Hoberg
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
Toshi Patel
 
Automated Testing: DevOps Enabler by Alan Koch
Automated Testing: DevOps Enabler by Alan KochAutomated Testing: DevOps Enabler by Alan Koch
Automated Testing: DevOps Enabler by Alan Koch
QA or the Highway
 
Growth Mindset
Growth MindsetGrowth Mindset
Growth Mindset
Nopadon Wongpakdee
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)
Dagmar Monett
 
Ignite Your Growth V2
Ignite Your Growth V2Ignite Your Growth V2
Ignite Your Growth V2
lscott316
 
Software Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival GuideSoftware Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival Guide
Oleksandr Lutsaievskyi
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
Tim Homuth
 

Viewers also liked (20)

Testing and checking by Newton Olivieri
Testing and checking by Newton OlivieriTesting and checking by Newton Olivieri
Testing and checking by Newton Olivieri
 
What to do with the problems you cannot solve?
What to do with the problems you cannot solve?What to do with the problems you cannot solve?
What to do with the problems you cannot solve?
 
Page object from the ground up by Joe Beale
Page object from the ground up by Joe BealePage object from the ground up by Joe Beale
Page object from the ground up by Joe Beale
 
Defect Triage by Matt Eakin
Defect Triage by Matt EakinDefect Triage by Matt Eakin
Defect Triage by Matt Eakin
 
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
Create testing commandos for creative problem solving!!! by Pradeepa Narayana...
 
Curating Your Cukes by Eric Kessler
Curating Your Cukes by Eric KesslerCurating Your Cukes by Eric Kessler
Curating Your Cukes by Eric Kessler
 
The psychology of testing
The psychology of testingThe psychology of testing
The psychology of testing
 
How to deal with bad requirements of software
How to deal with bad requirements of softwareHow to deal with bad requirements of software
How to deal with bad requirements of software
 
Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!Put Risk Based Testing in place right now!
Put Risk Based Testing in place right now!
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based Testing
 
Improving Test Team Throughput via Architecture by Dustin Williams
Improving Test Team Throughput via Architecture by Dustin WilliamsImproving Test Team Throughput via Architecture by Dustin Williams
Improving Test Team Throughput via Architecture by Dustin Williams
 
Practical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing MethodsPractical Application Of Risk Based Testing Methods
Practical Application Of Risk Based Testing Methods
 
Risk-based Testing
Risk-based TestingRisk-based Testing
Risk-based Testing
 
risk based testing and regression testing
risk based testing and regression testingrisk based testing and regression testing
risk based testing and regression testing
 
Automated Testing: DevOps Enabler by Alan Koch
Automated Testing: DevOps Enabler by Alan KochAutomated Testing: DevOps Enabler by Alan Koch
Automated Testing: DevOps Enabler by Alan Koch
 
Growth Mindset
Growth MindsetGrowth Mindset
Growth Mindset
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)
 
Ignite Your Growth V2
Ignite Your Growth V2Ignite Your Growth V2
Ignite Your Growth V2
 
Software Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival GuideSoftware Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival Guide
 
Think Like A Growth Hacker
Think Like A Growth HackerThink Like A Growth Hacker
Think Like A Growth Hacker
 

Similar to Bringing the hacker mindset into requirements and testing by Eapen Thomas and Jason Petry

Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Salesforce Partners
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
IBM Security
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
Core Security Technologies
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cenzic
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityTyler Shields
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
Bee_Ware
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
Ihor Uzhvenko
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
Pentest-Tools.com
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
ElanusTechnologies
 
Security overview 2
Security overview 2Security overview 2
Security overview 2
CMR WORLD TECH
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
Narola Infotech
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeSean Varga
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
zakieh alizadeh
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 

Similar to Bringing the hacker mindset into requirements and testing by Eapen Thomas and Jason Petry (20)

Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Security overview 2
Security overview 2Security overview 2
Security overview 2
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 

More from QA or the Highway

KrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdfKrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdf
QA or the Highway
 
Ravi Lakkavalli - World Quality Report.pptx
Ravi Lakkavalli - World Quality Report.pptxRavi Lakkavalli - World Quality Report.pptx
Ravi Lakkavalli - World Quality Report.pptx
QA or the Highway
 
Caleb Crandall - Testing Between the Buckets.pptx
Caleb Crandall - Testing Between the Buckets.pptxCaleb Crandall - Testing Between the Buckets.pptx
Caleb Crandall - Testing Between the Buckets.pptx
QA or the Highway
 
Thomas Haver - Mobile Testing.pdf
Thomas Haver - Mobile Testing.pdfThomas Haver - Mobile Testing.pdf
Thomas Haver - Mobile Testing.pdf
QA or the Highway
 
Thomas Haver - Example Mapping.pdf
Thomas Haver - Example Mapping.pdfThomas Haver - Example Mapping.pdf
Thomas Haver - Example Mapping.pdf
QA or the Highway
 
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdfJoe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
QA or the Highway
 
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
Sarah Geisinger - Continious Testing Metrics That Matter.pdfSarah Geisinger - Continious Testing Metrics That Matter.pdf
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
QA or the Highway
 
Jeff Sing - Quarterly Service Delivery Reviews.pdf
Jeff Sing - Quarterly Service Delivery Reviews.pdfJeff Sing - Quarterly Service Delivery Reviews.pdf
Jeff Sing - Quarterly Service Delivery Reviews.pdf
QA or the Highway
 
Leandro Melendez - Chihuahua Load Tests.pdf
Leandro Melendez - Chihuahua Load Tests.pdfLeandro Melendez - Chihuahua Load Tests.pdf
Leandro Melendez - Chihuahua Load Tests.pdf
QA or the Highway
 
Rick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdfRick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdf
QA or the Highway
 
Robert Fornal - ChatGPT as a Testing Tool.pptx
Robert Fornal - ChatGPT as a Testing Tool.pptxRobert Fornal - ChatGPT as a Testing Tool.pptx
Robert Fornal - ChatGPT as a Testing Tool.pptx
QA or the Highway
 
Federico Toledo - Extra-functional testing.pdf
Federico Toledo - Extra-functional testing.pdfFederico Toledo - Extra-functional testing.pdf
Federico Toledo - Extra-functional testing.pdf
QA or the Highway
 
Andrew Knight - Managing the Test Data Nightmare.pptx
Andrew Knight - Managing the Test Data Nightmare.pptxAndrew Knight - Managing the Test Data Nightmare.pptx
Andrew Knight - Managing the Test Data Nightmare.pptx
QA or the Highway
 
Melissa Tondi - Automation We_re Doing it Wrong.pdf
Melissa Tondi - Automation We_re Doing it Wrong.pdfMelissa Tondi - Automation We_re Doing it Wrong.pdf
Melissa Tondi - Automation We_re Doing it Wrong.pdf
QA or the Highway
 
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdfJeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
QA or the Highway
 
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptxDesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
QA or the Highway
 
Damian Synadinos - Word Smatter.pdf
Damian Synadinos - Word Smatter.pdfDamian Synadinos - Word Smatter.pdf
Damian Synadinos - Word Smatter.pdf
QA or the Highway
 
Lee Barnes - What Successful Test Automation is.pdf
Lee Barnes - What Successful Test Automation is.pdfLee Barnes - What Successful Test Automation is.pdf
Lee Barnes - What Successful Test Automation is.pdf
QA or the Highway
 
Jordan Powell - API Testing with Cypress.pptx
Jordan Powell - API Testing with Cypress.pptxJordan Powell - API Testing with Cypress.pptx
Jordan Powell - API Testing with Cypress.pptx
QA or the Highway
 
Carlos Kidman - Exploring AI Applications in Testing.pptx
Carlos Kidman - Exploring AI Applications in Testing.pptxCarlos Kidman - Exploring AI Applications in Testing.pptx
Carlos Kidman - Exploring AI Applications in Testing.pptx
QA or the Highway
 

More from QA or the Highway (20)

KrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdfKrishnaToolComparisionPPT.pdf
KrishnaToolComparisionPPT.pdf
 
Ravi Lakkavalli - World Quality Report.pptx
Ravi Lakkavalli - World Quality Report.pptxRavi Lakkavalli - World Quality Report.pptx
Ravi Lakkavalli - World Quality Report.pptx
 
Caleb Crandall - Testing Between the Buckets.pptx
Caleb Crandall - Testing Between the Buckets.pptxCaleb Crandall - Testing Between the Buckets.pptx
Caleb Crandall - Testing Between the Buckets.pptx
 
Thomas Haver - Mobile Testing.pdf
Thomas Haver - Mobile Testing.pdfThomas Haver - Mobile Testing.pdf
Thomas Haver - Mobile Testing.pdf
 
Thomas Haver - Example Mapping.pdf
Thomas Haver - Example Mapping.pdfThomas Haver - Example Mapping.pdf
Thomas Haver - Example Mapping.pdf
 
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdfJoe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
Joe Colantonio - Actionable Automation Awesomeness in Testing Farm.pdf
 
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
Sarah Geisinger - Continious Testing Metrics That Matter.pdfSarah Geisinger - Continious Testing Metrics That Matter.pdf
Sarah Geisinger - Continious Testing Metrics That Matter.pdf
 
Jeff Sing - Quarterly Service Delivery Reviews.pdf
Jeff Sing - Quarterly Service Delivery Reviews.pdfJeff Sing - Quarterly Service Delivery Reviews.pdf
Jeff Sing - Quarterly Service Delivery Reviews.pdf
 
Leandro Melendez - Chihuahua Load Tests.pdf
Leandro Melendez - Chihuahua Load Tests.pdfLeandro Melendez - Chihuahua Load Tests.pdf
Leandro Melendez - Chihuahua Load Tests.pdf
 
Rick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdfRick Clymer - Incident Management.pdf
Rick Clymer - Incident Management.pdf
 
Robert Fornal - ChatGPT as a Testing Tool.pptx
Robert Fornal - ChatGPT as a Testing Tool.pptxRobert Fornal - ChatGPT as a Testing Tool.pptx
Robert Fornal - ChatGPT as a Testing Tool.pptx
 
Federico Toledo - Extra-functional testing.pdf
Federico Toledo - Extra-functional testing.pdfFederico Toledo - Extra-functional testing.pdf
Federico Toledo - Extra-functional testing.pdf
 
Andrew Knight - Managing the Test Data Nightmare.pptx
Andrew Knight - Managing the Test Data Nightmare.pptxAndrew Knight - Managing the Test Data Nightmare.pptx
Andrew Knight - Managing the Test Data Nightmare.pptx
 
Melissa Tondi - Automation We_re Doing it Wrong.pdf
Melissa Tondi - Automation We_re Doing it Wrong.pdfMelissa Tondi - Automation We_re Doing it Wrong.pdf
Melissa Tondi - Automation We_re Doing it Wrong.pdf
 
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdfJeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
Jeff Van Fleet and John Townsend - Transition from Testing to Leadership.pdf
 
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptxDesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
DesiradhaRam Gadde - Testers _ Testing in ChatGPT-AI world.pptx
 
Damian Synadinos - Word Smatter.pdf
Damian Synadinos - Word Smatter.pdfDamian Synadinos - Word Smatter.pdf
Damian Synadinos - Word Smatter.pdf
 
Lee Barnes - What Successful Test Automation is.pdf
Lee Barnes - What Successful Test Automation is.pdfLee Barnes - What Successful Test Automation is.pdf
Lee Barnes - What Successful Test Automation is.pdf
 
Jordan Powell - API Testing with Cypress.pptx
Jordan Powell - API Testing with Cypress.pptxJordan Powell - API Testing with Cypress.pptx
Jordan Powell - API Testing with Cypress.pptx
 
Carlos Kidman - Exploring AI Applications in Testing.pptx
Carlos Kidman - Exploring AI Applications in Testing.pptxCarlos Kidman - Exploring AI Applications in Testing.pptx
Carlos Kidman - Exploring AI Applications in Testing.pptx
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Bringing the hacker mindset into requirements and testing by Eapen Thomas and Jason Petry

  • 1. BRINGING THE HACKER MINDSET INTO REQUIREMENTS AND TESTING Jason Petry Eapen Thomas Nationwide Insurance
  • 2. AGENDA  How bad is our application security? Why are we so bad at securing our applications?  An example application: money transferring application  2 Views of Quality – Producer vs. Consumer  Why are security requirements so hard?  Tools to aid requirements and test analysts  Threat Models  Attack trees  Securing our applications is getting more challenging  Call to action 2
  • 3. YOUR PERSONAL INFO IS PUBLIC 3Source: Symantec Internet Security Threat Report A New Zero-Day Vulnerability Was Discovered on Average Each Week in 2015  Advanced attack groups continue to profit from previously undiscovered flaws in browsers and website plugins Over Half a Billion Personal Records Were Stolen or Lost in 2015 Major Security Vulnerabilities in Three Quarters of Popular Websites Put Us All at Risk  Web administrators still struggle to stay current on patches
  • 4. MOBILE VULNERABILITIES ARE OFF THE CHART 4Source: Symantec Internet Security Threat Report Android users willingly downloaded over two billion malicious mobile applications last year Source: http://www.itproportal.com/2016/02/26/smartphone-users-still-taking-cavalier-approach-mobile-security/ Nearly 25 percent of mobile apps contain at least one high-risk security flaw An average mobile device connects to 160 different IP addresses daily 35 percent of mobile device communications are unencrypted There is a 50 percent greater chance that games include a high-risk vulnerability than the average app.
  • 5. SOME SCARY INDUSTRY NUMBERS 84% of cyber attacks are happening at the application layer Source: Forbes / SAP (March 2015) 98% of applications scanned by Trustwave harbored one or more security vulnerabilities. Meanwhile, the median number of vulnerabilities was 20 - up from six the year prior. Source: 2015 Trustwave Global Security Report Exploiting many of these application vulnerabilities is “VERY EASY” 5
  • 6. SECURITY VS FUNCTIONAL RQRMTS & TESTING  Security requirements and testing is different from functional requirements & testing.  In security testing the goal is to find out if the system can stand up to abusers. Negative tests are critical.  Security test scenarios may not be realistic from a common user standpoint . Especially when considering web applications, attackers may interact with the application in critically different ways compared to regular users.  Anticipating and planning for these scenarios is vital for security testing  Security requirements and testing requires an adversarial mindset, a "what if" mindset, i.e., the same one hackers use to break systems. 6
  • 7. EXAMPLE REQUIREMENT STORY Cyclone Transfers – A Pay-pal like service. “As a logged in customer, I can transfer money, so that I move money from one of my accounts to another customer’s account.” Acceptance Criteria:  The amount of money I transfer must be less than the amount of money available.  All amounts are in US Dollars.  Transfers may be for fractions of a penny. 7
  • 9. WHAT IS QUALITY? What are the two views of Quality? The producer view and the customer view. The producer view of quality: a product is a quality product if it meets or conforms to the product requirements. This statement is usually shortened to: quality means meets requirements. The customer view of quality: fit for use; the product or service meets the customer’s needs regardless of the requirements 9
  • 10. THE PRODUCER VIEW OF QUALITY Ok, so, what is the problem?  We don’t have much/any application security requirements (this is an industry wide problem)  To create good security requirements, the analyst should review (Organizational requirements, Privacy requirements, statutory requirements and industry requirements)  Organizational security policies and standards  Org privacy policies  Regulatory requirements (Sarbanes-Oxley, HIPAA etc.)  Other standards such as PCI DSS, ANSI-X9 for banks etc.  What is the solution? The requirements analysts have to be Creative 10
  • 11. CUSTOMER VIEW OF QUALITY Let’s now switch to the customer view of quality Oops! We have a bigger problem! To the customer, a product is a quality product if it meets the customer’s needs, regardless of whether the requirements were met.  We have to go beyond requirements (even if we have some security requirements).  For this, we definitely have to be creative, requires an adversarial mindset  We talk about some resources from OWASP and other organizations that can help 11
  • 12. TESTERS HAVE TO BE CREATIVE Test analysts should be creative in the absence of good security requirements: Automated web application security testing tools can help Explore & Discover – Exploratory testing comes handy Use Common Sense & Experience - common knowledge that comes from experience Discussions, Emails and Meeting Notes Create and review the high level test scenarios with the business 12
  • 13. OWASP TOP 10 When we talk about web application vulnerabilities, we have to talk about Open Web Application Security Project (OWASP) Top 10 vulnerabilities. Please note: this is “a” list, not the exhaustive list of all possible web application vulnerabilities (there are hundreds of them) 13
  • 14. CURE FOR MOST PROBLEMS: INPUT VALIDATION Many vulnerabilities are exploited by injecting malicious commands/code through input forms TYPE  Always check the data type of the input and make sure it matches the expected data type. For example, if there is an input box which accepts numeric data and the letter ‘O’ is typed instead of the number zero, it should not be accepted. LENGTH  Always check that the data lies within the acceptable range of lengths for the values expected. For example, a zip code field will be either 5 or 10 (dashes included) digits in length. If nothing is entered, or if 11 or more digits are entered, it should not be accepted. FORMAT  Always check that data is in a specified format. For example, dates should be in a specific format (such as MM/DD/YYYY). If it is not in the correct format, it should not be accepted. RANGE  Always check that data lies within a specified range of values. For example, the month of a person’s date of birth should lie between 1 and 12. If it does not fall within that range, it should not be accepted. 14
  • 15. THREAT MODELLING “Threat modeling is about using models to find security problems.” – Adam Shostack, Threat Modeling: Designing for Security “Coming up with a set of possible attacks you plan to protect against” – Electronic Frontier Foundation (https://ssd.eff.org/en/glossary/threat-model) 15
  • 16. THREAT MODELLING EXAMPLE May be many Data Flow Diagrams (DFD’s) for one application/process, at varying levels of detail.
  • 17. THREAT MODELLING Can be done with varying levels of formality, and with different focuses; method adopted should be tailored to specific application need. One Common Methodology is Microsoft’s STRIDE model.  Model: decompose the application as a data flow diagram (DFD) to drive the overall risk analysis process.  Identify: In the next step, threats to the modeled system are identified and enumerated  Mitigate: After threats have been identified, mitigations to those threats are selected  Validate: Implement tests to validate threat is mitigated. Spoofing: Impersonating something or someone else Tampering: Modifying data or code Repudiation: Claiming to have not performed an action Information Disclosure: Exposing information to someone not authorized to see it Denial of Service: Deny or degrade service to users Elevation of Privilege: Gain capabilities without proper authorization
  • 18. Steal someone’s account Trick someone into giving me money Enter a negative number for a transfer I make ATTACK TREES Get someone else to give me money Fool the system into giving me money Get Funds Transferred to me with no work. 18
  • 19. NEGATIVE TEST EXAMPLES #1 Test: The Single Quote: '  Helpful to make sure SQL injection attacks have been properly mitigated against  Also useful for ensuring anti-SQL injection protections properly deal with single quote characters in user data. 19
  • 20. EXAMPLE SINGLE QUOTE TEST Cyclone Transfers: Test Procedure  Login  Go to all users.  Use Search function to find abcdef  Use Search function to find O’Brian Expected result: No users found same results for both Actual Result: Error Message in second case. 20
  • 21. NEGATIVE TEST CASE: HTML CONTENT Another important test case: Allowing entry of HTML input, and properly displaying the result. (i.e., as text) Cross-Site Scripting is the single most commonly encountered security issue in web applications. 21
  • 22. EXAMPLE HTML CONTENT TEST Cyclone Transfers: Test Procedure  Click on Sign In, then Sign Up.  Create new account, in Profile Statement section include following content: <script>alert(123)</script>  Log in a different user, go to all users and search for newly created user. Expected Result: Profile Statement is displayed in search results as typed above. Actual Result: Alert Box Created. 22
  • 23. NEGATIVE TEST CASE: DIRECT OBJECT ACCESS If URL’s to content are static, ensure that user’s cannot access other users’ content. Unlike previous two cases, very difficult for multi-purpose scanner tools to detect and respond; requires knowledge of the application and data access rules. 23
  • 24. EXAMPLE DIRECT OBJECT ACCESS Cyclone Transfers: Test Procedures  Create New User, as in last Test  In New User, add account, and upload test PDF as “Bank Statement”.  Click on link to uploaded PDF to validate. Create Bookmark to PDF.  Log in a different account, use bookmark to go to PDF  Expected Result: Access should be denied.  Actual Result: PDF Displayed 24
  • 25. THE RUGGED MANIFESTO HTTPS://WWW.RUGGEDSOFTWARE.ORG/ I am rugged and, more importantly, my code is rugged. I recognize that software has become a foundation of our modern world. I recognize the awesome responsibility that comes with this foundational role. I recognize that my code will be used in ways I cannot anticipate, in ways it was not designed, and for longer than it was ever intended. I recognize that my code will be attacked by talented and persistent adversaries who threaten our physical, economic and national security. I recognize these things – and I choose to be rugged. I am rugged because I refuse to be a source of vulnerability or weakness. I am rugged because I assure my code will support its mission. I am rugged because my code can face these challenges and persist in spite of them. I am rugged, not because it is easy, but because it is necessary and I am up for the challenge. 25
  • 26. THINGS ARE NOT GETTING ANY EASIER Things are not getting any easier, they are getting really complicated, very fast  Human beings are still the weakest link  Ballooning attack surface The number of Mobile devices are growing, mobile apps are getting very functional/complicated Internet of things is making application security more difficult with the amount of interconnected devices 26
  • 27. CALL TO ACTION Don’t be left behind, security requirements elicitation & testing skills are essential, not optional A skill you must have to be competitive/marketable/just to survive Get trained, get competent in software security requirements elicitation techniques & security testing techniques  Resources are lacking  Conferences that cater to analysts, have no tracks or have very few tracks on application security requirement/testing 27
  • 28. RESOURCES  OWASP https://www.owasp.org  OWASP Testing Guide (200+ page PDF document is free to download) https://www.owasp.org/index.php/OWASP_Testing_Project  OWASP Application Security Verification Standard 3.0 https://www.owasp.org/images/6/67/OWASPApplicationSecurityVerificationStandard3.0.pdf  OWASP Broken Web Application Project https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project  SANS SWAT checklist https://software-security.sans.org/resources/swat  Microsoft SDL Threat Modeling Tool https://www.microsoft.com/en-us/download/confirmation.aspx?id=49168 28
  • 29. THANK YOU! If you would like to contact us: Jason Petry (petryj2@nationwide.com) Eapen Thomas (eapen@nationwide.com) 29