SlideShare a Scribd company logo
Confessions of an Accidental 
Security Tester 
"I didn't break in, you left the door open" 
Alan Richardson 
@eviltester 
www.SeleniumSimplified.com 
www.EvilTester.com 
www.CompendiumDev.co.uk 
www.JavaForTesters.com
2 
WARNING 
I AM NOT A 
SECURITY 
TESTER
3 
“I am not a security tester” 
● I am a user that observes the system 
at a lower level of detail than many 
users 
● I think about what I observe 
● Based on my observations I then ask 
the system 'what if?' questions
4 
“Accidentally Stumble” 
I prefer to get paid for finding defects 
But... 
● I use the web for business 
● My personal details are submitted to web sites 
● I like to make sure I'm safe 
● I 'accidentally stumble' across security defects
5 
“By adopting my 
'Bad' habits, you can 
Accidentally Stumble 
across Security 
Defects too”
6 
How I 'Accidentally Stumble' 
● I use browser dev tools in my normal day to day 
web surfing: 
– Firebug, Chrome Developer Tools 
● I often have all my web traffic running through a 
debug proxy: 
– Fiddler, BurpSuite, ZAP 
● I inspect Web Forms before I submit them 
This is normal behaviour for me.
7 
“I developed these 
'bad' habits out of 
necessity”
8 
I wanted to skip the online TV ads
9 
I sucked at online games
10 
Reading 'unreadable content'
Bypassing Bugs and annoyances on 
11 
WebSites 
● Div based overlays that stop me doing what 
I need to 
● Buttons not enabled when they should be 
● Incorrect JavaScript validation that marks 
invalid my valid details 
● Etc.
“It wasn't me Guv, 
THEY made me do it” 
12
13 
“Other normal people 
will develop these 
habits as well”
14 
It won't just be me doing this 
● Browser Dev Tools are now installed by default 
● Everyone has access to lower level observation 
and manipulation features 
● “No user would ever do that” is no longer valid 
● Some users are kids. 
– Kids love doing this
15 
“I'm not a security 
tester. I'm just a 
Cruddy guy”
16 
C.R.U.D.dy 
● Create 
– Create new POST requests with the information you 
want 
● Read 
– Read the HTTP requests and see the information to 
build a model of the system 
● Update 
– Update the information sent to the server to match 
what I want 
● Delete 
– Delete requests and responses I dont' want
17 
What do you apply CRUD to? 
● URL 
● Cookies 
● Payloads 
● Form Fields 
● DOM 
● HTTP Methods 
● HTTP Headers 
● etc. 
– make a list of 'entities' involved in HTTP process
18 
Example URL CRUD 
● URL 
– (C)Guess new urls, new params, mixup params 
– (R)track used urls, 
– (U)amend params in url, 
– (D)change HTTP method; delete params 
● Why? 
– See new products, change items in page, 
undocumented API commands, etc. 
● How? 
– Proxy tools, Amend DOM, Amend URL in browser
● Read 
● Update Before Sending 
● Delete so never sent 
● Create new requests 
based on old requests 
19 
Example HTTP Request 
Amend in DOM 
before sent 
to proxy 
Browser Proxy Server 
● Read 
● Update Before Receipt 
● Create/Replace so receive 
something else 
● Delete so never Received
20 
Example Cookie CRUD 
● Create new Cookies 
● Update values 
● Read – track cookies over time 
● Delete Cookies 
● Why? 
– Session hijacking, new permissions, change 
baskets, depends what they are used for, etc. 
● How? 
– Browser dev tools, Debug Proxy
21 
My First Proper Security Bug 
● My first crowd sourced testing 
experiment 
– Testing a 'social media' video sharing 
& watching site 
● Everyone else: 
– Low hanging fruit, spelling errors, 
broken links, missing images, etc. 
● Me: 
– I can access the live system and see 
all customer details including emails 
and addresses
22 
How did I find the defect? 
● I used the site 
● I ran the traffic through a Proxy 
● I saw the urls of requests that 
returned user data 
● I created a request & tried /users/ 
instead of /user 
● I changed test.site.com to site.com 
to hit live 
● Ooops, live data vulnerability 
Read 
Observe / Model 
Create 
Update
23 
Lessons Learned – 
Companies Love Security Defects 
5 Star Tester 
Only Quality 
Defects Here
Technical Defect 
24 
See how much they loved me 
I raised a 
I raised a 
showstopper! 
I was 5 star, 
now I'm 4.5 
$$ Big Money $$
25 
I didn't deliberately look for a 
security issue 
● I explored the system 
– Perform normal functions, observing traffic 
● I built a model 
– How do the requests map to the functions 
● I thought about the model from a 'risk' 
perspective 
– Does the API let you see all Users? 
– Does this work on live? 
● I found a way to ask the system the questions
26 
Generic Lessons Learned 
● The techniques and tools that we normally use 
for web testing extend to security testing 
● Increase your ability to Observe the system 
● Model the system 
● Think about what that model implies 
● Manipulate the system and ask 'what if' 
questions 
– Sometimes known as 'testing'
27 
Defects I 'mostly' got fixed 
● Viewing the revenue reports for other sellers 
– Urls not protected by user permissions 
● Unpaid video downloading via ipad and android 
– Permissions from web across devices 
● The 'Get' that became a 'Post' 
– Comments in site, Open source documentation 
● Should I be able to buy this for $0? 
– Shopping cart amendment
28 
Some notes on 
Reporting and 
Advocacy
29 
My old process 
● Email to support 
● Another Email 
● And another 
● Etc.
30 
When it was really serious 
● Email to support 
● Public post in their user forums or Facebook 
● Email to support 
● Find the emails of CEO, CTO, etc. 
● Email as many people in the company as I can 
● Replies to other people's posts in the forums 
Nag Nag Naggity Nag
31 
What I've found works 
● Create a video of you doing the exploit, as 
though it were a tutorial video 
● Email the video 
● Mention that you release video tutorials to 
YouTube 
youtube.com/EvilTesterVideos
32 
Lessons learned 
● Make it impossible to misunderstand 
– Write it up clearly 
– Show it in Action 
– Create a 'script' that performs the exploit 
● Let everyone in the company that you can find 
see the exploit
33 
And if they don't fix it... 
...at least you have an automated 
script that allows you to continue to 
take advantage of it
34 
“Some Defects 
don't get fixed 
quickly, they are 
still live”
35 
“I stumbled across 
security issues on 
a well known 
developer 
conference web 
site”
36 
“There are product 
sales sites where I 
can still download 
their stuff for free”
“I found a 'download' 
form that supplied me 
37 
with emails and 
server commands I 
could have tried”
38 
If you are a tester... 
● You should already have the thought processes 
required to stumble across these issues 
– Model, Observe, Risk, Manipulate, CRUD 
● You may need to learn 
– to read HTTP requests 
– JavaScript, and use the Dev Tool Debugger 
● You may need to start using 
– Debug Proxies – Fiddler, ZAP, BurpSuite 
– Browser Dev Tools & Firebug
39 
WARNING 
THIS IS A 
SLIPPERY 
SLOPE 
OUCH!
40 
Warning: Slippery Slope 
● You start seeing more of these problems 
● You become more concerned... 
– And start using VPNs 
– Monitoring your apps and network using Wireshark 
● You gain more technical knowledge 
● You test at deeper levels of the system
41 
And I learn generic issues 
● Too much data in JSON 
– Performance issue 
– Possible Security Issue 
● Knock on security impact of small change 
● Data in JSON used in 'other' places 
– Enrich domain model from multiple sources
42 
Suggested Reading/ Viewing 
unow.be/at/techwebtest101
43 
Suggested Gateway Hobbies 
● Monitor HTTP Wifi Network traffic using 
WireShark 
– Suggested locations: Hotels, Public WiFi, 
Conferences, and Airport Lounges 
● Monitor your network traffic using an HTTP 
debug proxy 
● Investigate the DOM using Browser Dev Tools, 
by default 
● Break out of the sandbox of Kiosk systems
44 
Blogs and Websites 
● CompendiumDev.co.uk 
● SeleniumSimplified.com 
● EvilTester.com 
● JavaForTesters.com 
● Twitter: @eviltester 
Online Training Courses 
● Technical Web Testing 101 
Unow.be/at/techwebtest101 
● Intro to Selenium 
Unow.be/at/startwebdriver 
● Selenium 2 WebDriver API 
Unow.be/at/webdriverapi 
Videos 
youtube.com/user/EviltesterVideos 
Books 
Selenium Simplified 
Unow.be/rc/selsimp 
Java For Testers 
leanpub.com/javaForTesters 
Alan Richardson 
uk.linkedin.com/in/eviltester 
Independent Test Consultant 
& Custom Training 
Contact Alan 
http://compendiumdev.co.uk/contact

More Related Content

PDF
TestIstanbul May 2013 Keynote Experiences With Exploratory Testing
PDF
Technical Testing Webinar
PDF
Open source tools - Test Management Summit - 2009
PDF
Black Ops Testing Workshop from Agile Testing Days 2014
PDF
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
PDF
If you want to automate, you learn to code
ODP
How to Improve Your Technical Test Ability - AADays 2015 Keynote
PDF
Evil testers guide to technical testing
TestIstanbul May 2013 Keynote Experiences With Exploratory Testing
Technical Testing Webinar
Open source tools - Test Management Summit - 2009
Black Ops Testing Workshop from Agile Testing Days 2014
Agile Testing Days 2014 Keynote - Helping Testers Add Value on Agile Projects
If you want to automate, you learn to code
How to Improve Your Technical Test Ability - AADays 2015 Keynote
Evil testers guide to technical testing

What's hot (20)

PDF
Lessons Learned When Automating
PPTX
Risk Mitigation Using Exploratory and Technical Testing - QASymphony Webinar ...
PDF
Add More Security To Your Testing and Automating - Saucecon 2021
PDF
Abstraction Layers Test Management Summit Faciliated Session 2014
PDF
Technology Based Testing
PDF
Test Bash Netherlands Alan Richardson "How to misuse 'Automation' for testing...
PDF
The Art of Questioning to improve Software Testing, Agile and Automating
PDF
Devfest 2019-slides
PDF
Automating Pragmatically - Testival 20190604
PDF
Secrets and Mysteries of Automated Execution Keynote slides
PDF
Practical Test Automation Deep Dive
PDF
Automating to Augment Testing
PDF
Effective Software Testing for Modern Software Development
PDF
Automating Tactically vs Strategically SauceCon 2020
PDF
How To Test With Agility
PDF
Technical and Testing Challenges: Using the "Protect The Square" Game
PDF
Odinstar 2017 - Real World Automating to Support Testing
PDF
Joy of Coding Conference 2019 slides - Alan Richardson
PDF
Your Automated Execution Does Not Have to be Flaky
PDF
Test Automation Day 2015 Keynote Alan Richardson - Practical Lessons Learned ...
Lessons Learned When Automating
Risk Mitigation Using Exploratory and Technical Testing - QASymphony Webinar ...
Add More Security To Your Testing and Automating - Saucecon 2021
Abstraction Layers Test Management Summit Faciliated Session 2014
Technology Based Testing
Test Bash Netherlands Alan Richardson "How to misuse 'Automation' for testing...
The Art of Questioning to improve Software Testing, Agile and Automating
Devfest 2019-slides
Automating Pragmatically - Testival 20190604
Secrets and Mysteries of Automated Execution Keynote slides
Practical Test Automation Deep Dive
Automating to Augment Testing
Effective Software Testing for Modern Software Development
Automating Tactically vs Strategically SauceCon 2020
How To Test With Agility
Technical and Testing Challenges: Using the "Protect The Square" Game
Odinstar 2017 - Real World Automating to Support Testing
Joy of Coding Conference 2019 slides - Alan Richardson
Your Automated Execution Does Not Have to be Flaky
Test Automation Day 2015 Keynote Alan Richardson - Practical Lessons Learned ...
Ad

Similar to Confessions of an Accidental Security Tester (20)

PPTX
Pentesting Tips: Beyond Automated Testing
PDF
PDF
Push Functional Testing Further
PDF
Bridging the gap - Security and Software Testing
PPT
Security Testing
 
PDF
Web Application Security: Introduction to common classes of security flaws an...
PDF
Tw noche geek quito webappsec
PPTX
Web applications security conference slides
PDF
Zen and the art of Security Testing
DOC
Web testing essentials
PDF
Owasp tds
 
PPTX
Started In Security Now I'm Here
PDF
Daniel billing exploring the security testers toolbox
PPTX
DEF CON 23 - Hacking Web Apps @brentwdesign
PPT
BSidesDC 2016 Beyond Automated Testing
PPTX
Test execution
KEY
How to break web applications
PDF
Ekoparty 2017 - The Bug Hunter's Methodology
PPT
Security Testing for Mobile and Web Apps
PDF
Testers, get into security bug bounties!
Pentesting Tips: Beyond Automated Testing
Push Functional Testing Further
Bridging the gap - Security and Software Testing
Security Testing
 
Web Application Security: Introduction to common classes of security flaws an...
Tw noche geek quito webappsec
Web applications security conference slides
Zen and the art of Security Testing
Web testing essentials
Owasp tds
 
Started In Security Now I'm Here
Daniel billing exploring the security testers toolbox
DEF CON 23 - Hacking Web Apps @brentwdesign
BSidesDC 2016 Beyond Automated Testing
Test execution
How to break web applications
Ekoparty 2017 - The Bug Hunter's Methodology
Security Testing for Mobile and Web Apps
Testers, get into security bug bounties!
Ad

More from Alan Richardson (16)

PDF
The Future of Testing Webinar
PDF
Programming katas for Software Testers - CounterStrings
PDF
About Consultant Alan Richardson Compendium Developments Evil Tester
PDF
Shift left-testing
PDF
Automating and Testing a REST API
PDF
TDD - Test Driven Development - Java JUnit FizzBuzz
PDF
What is Testability vs Automatability? How to improve your Software Testing.
PDF
What is Agile Testing? A MindMap
PDF
Evil Tester's Guide to Agile Testing
PDF
The Evil Tester Show - Episode 001 Halloween 2017
PDF
What is Regression Testing?
PDF
Simple ways to add and work with a `.jar` file in your local maven setup
PDF
Re-thinking Test Automation and Test Process Modelling (in pictures)
PDF
Automating Strategically or Tactically when Testing
PDF
Learning in Public - A How to Speak in Public Workshop
PDF
How to Practise to Remove Fear of Public Speaking
The Future of Testing Webinar
Programming katas for Software Testers - CounterStrings
About Consultant Alan Richardson Compendium Developments Evil Tester
Shift left-testing
Automating and Testing a REST API
TDD - Test Driven Development - Java JUnit FizzBuzz
What is Testability vs Automatability? How to improve your Software Testing.
What is Agile Testing? A MindMap
Evil Tester's Guide to Agile Testing
The Evil Tester Show - Episode 001 Halloween 2017
What is Regression Testing?
Simple ways to add and work with a `.jar` file in your local maven setup
Re-thinking Test Automation and Test Process Modelling (in pictures)
Automating Strategically or Tactically when Testing
Learning in Public - A How to Speak in Public Workshop
How to Practise to Remove Fear of Public Speaking

Recently uploaded (20)

PPTX
L1 - Introduction to python Backend.pptx
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Digital Strategies for Manufacturing Companies
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
history of c programming in notes for students .pptx
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
AI in Product Development-omnex systems
PPTX
Transform Your Business with a Software ERP System
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
L1 - Introduction to python Backend.pptx
ManageIQ - Sprint 268 Review - Slide Deck
Digital Strategies for Manufacturing Companies
Design an Analysis of Algorithms I-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
history of c programming in notes for students .pptx
CHAPTER 2 - PM Management and IT Context
VVF-Customer-Presentation2025-Ver1.9.pptx
ISO 45001 Occupational Health and Safety Management System
AI in Product Development-omnex systems
Transform Your Business with a Software ERP System
Upgrade and Innovation Strategies for SAP ERP Customers
How to Migrate SBCGlobal Email to Yahoo Easily
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PTS Company Brochure 2025 (1).pdf.......
Operating system designcfffgfgggggggvggggggggg
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Design an Analysis of Algorithms II-SECS-1021-03
Odoo Companies in India – Driving Business Transformation.pdf
Wondershare Filmora 15 Crack With Activation Key [2025

Confessions of an Accidental Security Tester

  • 1. Confessions of an Accidental Security Tester "I didn't break in, you left the door open" Alan Richardson @eviltester www.SeleniumSimplified.com www.EvilTester.com www.CompendiumDev.co.uk www.JavaForTesters.com
  • 2. 2 WARNING I AM NOT A SECURITY TESTER
  • 3. 3 “I am not a security tester” ● I am a user that observes the system at a lower level of detail than many users ● I think about what I observe ● Based on my observations I then ask the system 'what if?' questions
  • 4. 4 “Accidentally Stumble” I prefer to get paid for finding defects But... ● I use the web for business ● My personal details are submitted to web sites ● I like to make sure I'm safe ● I 'accidentally stumble' across security defects
  • 5. 5 “By adopting my 'Bad' habits, you can Accidentally Stumble across Security Defects too”
  • 6. 6 How I 'Accidentally Stumble' ● I use browser dev tools in my normal day to day web surfing: – Firebug, Chrome Developer Tools ● I often have all my web traffic running through a debug proxy: – Fiddler, BurpSuite, ZAP ● I inspect Web Forms before I submit them This is normal behaviour for me.
  • 7. 7 “I developed these 'bad' habits out of necessity”
  • 8. 8 I wanted to skip the online TV ads
  • 9. 9 I sucked at online games
  • 11. Bypassing Bugs and annoyances on 11 WebSites ● Div based overlays that stop me doing what I need to ● Buttons not enabled when they should be ● Incorrect JavaScript validation that marks invalid my valid details ● Etc.
  • 12. “It wasn't me Guv, THEY made me do it” 12
  • 13. 13 “Other normal people will develop these habits as well”
  • 14. 14 It won't just be me doing this ● Browser Dev Tools are now installed by default ● Everyone has access to lower level observation and manipulation features ● “No user would ever do that” is no longer valid ● Some users are kids. – Kids love doing this
  • 15. 15 “I'm not a security tester. I'm just a Cruddy guy”
  • 16. 16 C.R.U.D.dy ● Create – Create new POST requests with the information you want ● Read – Read the HTTP requests and see the information to build a model of the system ● Update – Update the information sent to the server to match what I want ● Delete – Delete requests and responses I dont' want
  • 17. 17 What do you apply CRUD to? ● URL ● Cookies ● Payloads ● Form Fields ● DOM ● HTTP Methods ● HTTP Headers ● etc. – make a list of 'entities' involved in HTTP process
  • 18. 18 Example URL CRUD ● URL – (C)Guess new urls, new params, mixup params – (R)track used urls, – (U)amend params in url, – (D)change HTTP method; delete params ● Why? – See new products, change items in page, undocumented API commands, etc. ● How? – Proxy tools, Amend DOM, Amend URL in browser
  • 19. ● Read ● Update Before Sending ● Delete so never sent ● Create new requests based on old requests 19 Example HTTP Request Amend in DOM before sent to proxy Browser Proxy Server ● Read ● Update Before Receipt ● Create/Replace so receive something else ● Delete so never Received
  • 20. 20 Example Cookie CRUD ● Create new Cookies ● Update values ● Read – track cookies over time ● Delete Cookies ● Why? – Session hijacking, new permissions, change baskets, depends what they are used for, etc. ● How? – Browser dev tools, Debug Proxy
  • 21. 21 My First Proper Security Bug ● My first crowd sourced testing experiment – Testing a 'social media' video sharing & watching site ● Everyone else: – Low hanging fruit, spelling errors, broken links, missing images, etc. ● Me: – I can access the live system and see all customer details including emails and addresses
  • 22. 22 How did I find the defect? ● I used the site ● I ran the traffic through a Proxy ● I saw the urls of requests that returned user data ● I created a request & tried /users/ instead of /user ● I changed test.site.com to site.com to hit live ● Ooops, live data vulnerability Read Observe / Model Create Update
  • 23. 23 Lessons Learned – Companies Love Security Defects 5 Star Tester Only Quality Defects Here
  • 24. Technical Defect 24 See how much they loved me I raised a I raised a showstopper! I was 5 star, now I'm 4.5 $$ Big Money $$
  • 25. 25 I didn't deliberately look for a security issue ● I explored the system – Perform normal functions, observing traffic ● I built a model – How do the requests map to the functions ● I thought about the model from a 'risk' perspective – Does the API let you see all Users? – Does this work on live? ● I found a way to ask the system the questions
  • 26. 26 Generic Lessons Learned ● The techniques and tools that we normally use for web testing extend to security testing ● Increase your ability to Observe the system ● Model the system ● Think about what that model implies ● Manipulate the system and ask 'what if' questions – Sometimes known as 'testing'
  • 27. 27 Defects I 'mostly' got fixed ● Viewing the revenue reports for other sellers – Urls not protected by user permissions ● Unpaid video downloading via ipad and android – Permissions from web across devices ● The 'Get' that became a 'Post' – Comments in site, Open source documentation ● Should I be able to buy this for $0? – Shopping cart amendment
  • 28. 28 Some notes on Reporting and Advocacy
  • 29. 29 My old process ● Email to support ● Another Email ● And another ● Etc.
  • 30. 30 When it was really serious ● Email to support ● Public post in their user forums or Facebook ● Email to support ● Find the emails of CEO, CTO, etc. ● Email as many people in the company as I can ● Replies to other people's posts in the forums Nag Nag Naggity Nag
  • 31. 31 What I've found works ● Create a video of you doing the exploit, as though it were a tutorial video ● Email the video ● Mention that you release video tutorials to YouTube youtube.com/EvilTesterVideos
  • 32. 32 Lessons learned ● Make it impossible to misunderstand – Write it up clearly – Show it in Action – Create a 'script' that performs the exploit ● Let everyone in the company that you can find see the exploit
  • 33. 33 And if they don't fix it... ...at least you have an automated script that allows you to continue to take advantage of it
  • 34. 34 “Some Defects don't get fixed quickly, they are still live”
  • 35. 35 “I stumbled across security issues on a well known developer conference web site”
  • 36. 36 “There are product sales sites where I can still download their stuff for free”
  • 37. “I found a 'download' form that supplied me 37 with emails and server commands I could have tried”
  • 38. 38 If you are a tester... ● You should already have the thought processes required to stumble across these issues – Model, Observe, Risk, Manipulate, CRUD ● You may need to learn – to read HTTP requests – JavaScript, and use the Dev Tool Debugger ● You may need to start using – Debug Proxies – Fiddler, ZAP, BurpSuite – Browser Dev Tools & Firebug
  • 39. 39 WARNING THIS IS A SLIPPERY SLOPE OUCH!
  • 40. 40 Warning: Slippery Slope ● You start seeing more of these problems ● You become more concerned... – And start using VPNs – Monitoring your apps and network using Wireshark ● You gain more technical knowledge ● You test at deeper levels of the system
  • 41. 41 And I learn generic issues ● Too much data in JSON – Performance issue – Possible Security Issue ● Knock on security impact of small change ● Data in JSON used in 'other' places – Enrich domain model from multiple sources
  • 42. 42 Suggested Reading/ Viewing unow.be/at/techwebtest101
  • 43. 43 Suggested Gateway Hobbies ● Monitor HTTP Wifi Network traffic using WireShark – Suggested locations: Hotels, Public WiFi, Conferences, and Airport Lounges ● Monitor your network traffic using an HTTP debug proxy ● Investigate the DOM using Browser Dev Tools, by default ● Break out of the sandbox of Kiosk systems
  • 44. 44 Blogs and Websites ● CompendiumDev.co.uk ● SeleniumSimplified.com ● EvilTester.com ● JavaForTesters.com ● Twitter: @eviltester Online Training Courses ● Technical Web Testing 101 Unow.be/at/techwebtest101 ● Intro to Selenium Unow.be/at/startwebdriver ● Selenium 2 WebDriver API Unow.be/at/webdriverapi Videos youtube.com/user/EviltesterVideos Books Selenium Simplified Unow.be/rc/selsimp Java For Testers leanpub.com/javaForTesters Alan Richardson uk.linkedin.com/in/eviltester Independent Test Consultant & Custom Training Contact Alan http://compendiumdev.co.uk/contact