SlideShare a Scribd company logo
Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com  harinath@dazasya.in
What is Inside?  What are Web Applications?  History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
What are Web Applications?
History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s  Encapsulating user data in environ variables  Hotmail  Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules  Scripting Scripting languages run code within the web server without being compiled
History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application.  It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE  ASP.NET
Architecture of Web Application
Testing Web Applications No Silver Bullet Think Strategically  Align with the SDLC  Test early and Test often  Understand the end-user  System configuration Repetitive requests  Use the Right TOOLS Perform White Box  Review Code as much as possible Develop appropriate metrics for your application
Testing  Techniques Manual Inspections & Reviews Threat Modeling  Pro’s  Con’s No supporting technology Can be used to a variety of situations Flexible  Early in SDLC  Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s  Con’s Practical attackers view of the system Flexible  Early in SDLC Relatively New Technique Good threat models do not mean good software  
Testing  Techniques Source Code Review  Penetration Testing Pro’s  Con’s Completeness and Effectiveness Accuracy  Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors  Code analyzed can be difference from code used.  Pro’s  Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
Test Effort in SDLC Test Effort in Test Technique
Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s  Make Ajax Cacheable
Free Web Testing Tools Jmeter  - - Functionality and Performance QASL  – Create automated web application tests HTTP Test Tool  – Scriptable Test Tool for HTTP Protocol solutions Tellurium  – UI based module testing framework  Badboy  – Record/Playback, Load Testing
OWASP – The Open Web Application Security Project www.OWASP.org  – Founded in 2001 http://www.owasp.org/index.php/Bangalore  - Bangalore Chapter Development Guide Testing Guide Open Source Tools
OWASP Body of Knowledge Core Application  Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure  Web Applications and Web Services Guide to Application Security Testing and  Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)
Thank You

More Related Content

PDF
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
PPTX
Agile and Secure Development
PDF
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
DOCX
Vipin_Pandey
PPTX
Unit testing : what are you missing for security
PPTX
Top 10 static code analysis tool
PPTX
Computer software specialists wikki verma
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
Agile and Secure Development
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Vipin_Pandey
Unit testing : what are you missing for security
Top 10 static code analysis tool
Computer software specialists wikki verma

What's hot (19)

PDF
Test Driven Development
PPTX
Code Review tool for personal effectiveness and waste analysis
PPTX
Doing Security Testing in Agile with ease
PDF
Top 50 Software Testing Interview Questions & Answers | Edureka
PPTX
SonarQube: Continuous Code Inspection
PPTX
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
PDF
LF_APIStrat17_Bulletproofing Your API's
DOC
Resume_sri
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PPTX
DevSecOps: Securing Applications with DevOps
PPTX
Code Review
PDF
Resume
PPTX
DevSecOps - It can change your life (cycle)
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
PDF
Code Review for iOS
PDF
Code Review: How and When
PPTX
Code Review Best Practices
DOCX
Code review guidelines
PPTX
Test Driven Development
Code Review tool for personal effectiveness and waste analysis
Doing Security Testing in Agile with ease
Top 50 Software Testing Interview Questions & Answers | Edureka
SonarQube: Continuous Code Inspection
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
LF_APIStrat17_Bulletproofing Your API's
Resume_sri
Static Application Security Testing Strategies for Automation and Continuous ...
DevSecOps: Securing Applications with DevOps
Code Review
Resume
DevSecOps - It can change your life (cycle)
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Code Review for iOS
Code Review: How and When
Code Review Best Practices
Code review guidelines
Ad

Similar to Cost effective web application testing (20)

PDF
OWASP-Web-Security-testing-4.2
PPTX
Integrating security into the application development process
PDF
Owasp testing guide_v4
PDF
Owasp testing guide_v4
PDF
OWASP Testing Guide 4.0
PPT
六合彩香港-六合彩
PPTX
Hacker vs Tools: Which to Choose?
PPTX
Hacker vs tools
PPT
Software Security Engineering
PPT
Owasp Eu Summit 2008 Owasp Testing Guide V3
PPT
OWASP Testing Guide v3
PPTX
Testing web based applications
KEY
improving the performance of Rails web Applications
PDF
Ibm עמרי וייסמן
PDF
Omri
PDF
Ibm עמרי וייסמן
PPT
Secure SDLC for Software
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PDF
CTU June 2011 - Things that Every ASP.NET Developer Should Know
OWASP-Web-Security-testing-4.2
Integrating security into the application development process
Owasp testing guide_v4
Owasp testing guide_v4
OWASP Testing Guide 4.0
六合彩香港-六合彩
Hacker vs Tools: Which to Choose?
Hacker vs tools
Software Security Engineering
Owasp Eu Summit 2008 Owasp Testing Guide V3
OWASP Testing Guide v3
Testing web based applications
improving the performance of Rails web Applications
Ibm עמרי וייסמן
Omri
Ibm עמרי וייסמן
Secure SDLC for Software
Application Security Testing for Software Engineers: An approach to build sof...
CTU June 2011 - Things that Every ASP.NET Developer Should Know
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

Cost effective web application testing

  • 1. Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com harinath@dazasya.in
  • 2. What is Inside? What are Web Applications? History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
  • 3. What are Web Applications?
  • 4. History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s Encapsulating user data in environ variables Hotmail Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules Scripting Scripting languages run code within the web server without being compiled
  • 5. History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application. It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE ASP.NET
  • 6. Architecture of Web Application
  • 7. Testing Web Applications No Silver Bullet Think Strategically Align with the SDLC Test early and Test often Understand the end-user System configuration Repetitive requests Use the Right TOOLS Perform White Box Review Code as much as possible Develop appropriate metrics for your application
  • 8. Testing Techniques Manual Inspections & Reviews Threat Modeling Pro’s Con’s No supporting technology Can be used to a variety of situations Flexible Early in SDLC Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s Con’s Practical attackers view of the system Flexible Early in SDLC Relatively New Technique Good threat models do not mean good software 
  • 9. Testing Techniques Source Code Review Penetration Testing Pro’s Con’s Completeness and Effectiveness Accuracy Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors Code analyzed can be difference from code used. Pro’s Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
  • 10. Test Effort in SDLC Test Effort in Test Technique
  • 11. Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s Make Ajax Cacheable
  • 12. Free Web Testing Tools Jmeter - - Functionality and Performance QASL – Create automated web application tests HTTP Test Tool – Scriptable Test Tool for HTTP Protocol solutions Tellurium – UI based module testing framework Badboy – Record/Playback, Load Testing
  • 13. OWASP – The Open Web Application Security Project www.OWASP.org – Founded in 2001 http://www.owasp.org/index.php/Bangalore - Bangalore Chapter Development Guide Testing Guide Open Source Tools
  • 14. OWASP Body of Knowledge Core Application Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure Web Applications and Web Services Guide to Application Security Testing and Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)