SlideShare a Scribd company logo
Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com  harinath@dazasya.in
What is Inside?  What are Web Applications?  History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
What are Web Applications?
History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s  Encapsulating user data in environ variables  Hotmail  Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules  Scripting Scripting languages run code within the web server without being compiled
History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application.  It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE  ASP.NET
Architecture of Web Application
Testing Web Applications No Silver Bullet Think Strategically  Align with the SDLC  Test early and Test often  Understand the end-user  System configuration Repetitive requests  Use the Right TOOLS Perform White Box  Review Code as much as possible Develop appropriate metrics for your application
Testing  Techniques Manual Inspections & Reviews Threat Modeling  Pro’s  Con’s No supporting technology Can be used to a variety of situations Flexible  Early in SDLC  Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s  Con’s Practical attackers view of the system Flexible  Early in SDLC Relatively New Technique Good threat models do not mean good software  
Testing  Techniques Source Code Review  Penetration Testing Pro’s  Con’s Completeness and Effectiveness Accuracy  Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors  Code analyzed can be difference from code used.  Pro’s  Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
Test Effort in SDLC Test Effort in Test Technique
Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s  Make Ajax Cacheable
Free Web Testing Tools Jmeter  - - Functionality and Performance QASL  – Create automated web application tests HTTP Test Tool  – Scriptable Test Tool for HTTP Protocol solutions Tellurium  – UI based module testing framework  Badboy  – Record/Playback, Load Testing
OWASP – The Open Web Application Security Project www.OWASP.org  – Founded in 2001 http://www.owasp.org/index.php/Bangalore  - Bangalore Chapter Development Guide Testing Guide Open Source Tools
OWASP Body of Knowledge Core Application  Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure  Web Applications and Web Services Guide to Application Security Testing and  Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)
Thank You

More Related Content

PDF
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
PPTX
Agile and Secure Development
PDF
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
DOCX
Vipin_Pandey
PPTX
Unit testing : what are you missing for security
PPTX
Top 10 static code analysis tool
PPTX
Computer software specialists wikki verma
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
Agile and Secure Development
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Vipin_Pandey
Unit testing : what are you missing for security
Top 10 static code analysis tool
Computer software specialists wikki verma

What's hot (19)

PDF
Test Driven Development
PPTX
Code Review tool for personal effectiveness and waste analysis
PPTX
Doing Security Testing in Agile with ease
PDF
Top 50 Software Testing Interview Questions & Answers | Edureka
PPTX
SonarQube: Continuous Code Inspection
PPTX
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
PDF
LF_APIStrat17_Bulletproofing Your API's
DOC
Resume_sri
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PPTX
DevSecOps: Securing Applications with DevOps
PPTX
Code Review
PDF
Resume
PPTX
DevSecOps - It can change your life (cycle)
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
PDF
Code Review for iOS
PDF
Code Review: How and When
PPTX
Code Review Best Practices
DOCX
Code review guidelines
PPTX
Test Driven Development
Code Review tool for personal effectiveness and waste analysis
Doing Security Testing in Agile with ease
Top 50 Software Testing Interview Questions & Answers | Edureka
SonarQube: Continuous Code Inspection
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
LF_APIStrat17_Bulletproofing Your API's
Resume_sri
Static Application Security Testing Strategies for Automation and Continuous ...
DevSecOps: Securing Applications with DevOps
Code Review
Resume
DevSecOps - It can change your life (cycle)
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Code Review for iOS
Code Review: How and When
Code Review Best Practices
Code review guidelines
Ad

Similar to Cost effective web application testing (20)

PDF
Shaloo Verma
PPTX
Cyber ppt
PPT
Stepin evening presented
DOCX
Software Testing Tools Training
PDF
VishalSinha_Resume_Ora
PPTX
How to Add Test Automation to your Quality Assurance Toolbelt
PDF
Ijetcas14 413
PPTX
Slides for Automation Testing or End to End testing
PPT
Agnitio: its static analysis, but not as we know it
PPT
Testing Mozilla Web Properties
PDF
Creating a successful continuous testing environment by Eran Kinsbruner
PPTX
Selenium
PPT
Best Practices In Load And Stress Testing Cmg Seminar[1]
PPT
GNUCITIZEN Dwk Owasp Day September 2007
PDF
Backend Developer Roadmap PDF By ScholarHat
PDF
Choosing right-automation-tool
PDF
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
PPTX
Dev{sec}ops
DOCX
Syllabus for Technical courses
PPTX
Software Quality
Shaloo Verma
Cyber ppt
Stepin evening presented
Software Testing Tools Training
VishalSinha_Resume_Ora
How to Add Test Automation to your Quality Assurance Toolbelt
Ijetcas14 413
Slides for Automation Testing or End to End testing
Agnitio: its static analysis, but not as we know it
Testing Mozilla Web Properties
Creating a successful continuous testing environment by Eran Kinsbruner
Selenium
Best Practices In Load And Stress Testing Cmg Seminar[1]
GNUCITIZEN Dwk Owasp Day September 2007
Backend Developer Roadmap PDF By ScholarHat
Choosing right-automation-tool
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Dev{sec}ops
Syllabus for Technical courses
Software Quality
Ad

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.

Cost effective web application testing

  • 1. Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com harinath@dazasya.in
  • 2. What is Inside? What are Web Applications? History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
  • 3. What are Web Applications?
  • 4. History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s Encapsulating user data in environ variables Hotmail Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules Scripting Scripting languages run code within the web server without being compiled
  • 5. History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application. It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE ASP.NET
  • 6. Architecture of Web Application
  • 7. Testing Web Applications No Silver Bullet Think Strategically Align with the SDLC Test early and Test often Understand the end-user System configuration Repetitive requests Use the Right TOOLS Perform White Box Review Code as much as possible Develop appropriate metrics for your application
  • 8. Testing Techniques Manual Inspections & Reviews Threat Modeling Pro’s Con’s No supporting technology Can be used to a variety of situations Flexible Early in SDLC Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s Con’s Practical attackers view of the system Flexible Early in SDLC Relatively New Technique Good threat models do not mean good software 
  • 9. Testing Techniques Source Code Review Penetration Testing Pro’s Con’s Completeness and Effectiveness Accuracy Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors Code analyzed can be difference from code used. Pro’s Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
  • 10. Test Effort in SDLC Test Effort in Test Technique
  • 11. Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s Make Ajax Cacheable
  • 12. Free Web Testing Tools Jmeter - - Functionality and Performance QASL – Create automated web application tests HTTP Test Tool – Scriptable Test Tool for HTTP Protocol solutions Tellurium – UI based module testing framework Badboy – Record/Playback, Load Testing
  • 13. OWASP – The Open Web Application Security Project www.OWASP.org – Founded in 2001 http://www.owasp.org/index.php/Bangalore - Bangalore Chapter Development Guide Testing Guide Open Source Tools
  • 14. OWASP Body of Knowledge Core Application Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure Web Applications and Web Services Guide to Application Security Testing and Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)