SlideShare a Scribd company logo
Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com  harinath@dazasya.in
What is Inside?  What are Web Applications?  History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
What are Web Applications?
History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s  Encapsulating user data in environ variables  Hotmail  Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules  Scripting Scripting languages run code within the web server without being compiled
History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application.  It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE  ASP.NET
Architecture of Web Application
Testing Web Applications No Silver Bullet Think Strategically  Align with the SDLC  Test early and Test often  Understand the end-user  System configuration Repetitive requests  Use the Right TOOLS Perform White Box  Review Code as much as possible Develop appropriate metrics for your application
Testing  Techniques Manual Inspections & Reviews Threat Modeling  Pro’s  Con’s No supporting technology Can be used to a variety of situations Flexible  Early in SDLC  Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s  Con’s Practical attackers view of the system Flexible  Early in SDLC Relatively New Technique Good threat models do not mean good software  
Testing  Techniques Source Code Review  Penetration Testing Pro’s  Con’s Completeness and Effectiveness Accuracy  Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors  Code analyzed can be difference from code used.  Pro’s  Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
Test Effort in SDLC Test Effort in Test Technique
Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s  Make Ajax Cacheable
Free Web Testing Tools Jmeter  - - Functionality and Performance QASL  – Create automated web application tests HTTP Test Tool  – Scriptable Test Tool for HTTP Protocol solutions Tellurium  – UI based module testing framework  Badboy  – Record/Playback, Load Testing
OWASP – The Open Web Application Security Project www.OWASP.org  – Founded in 2001 http://www.owasp.org/index.php/Bangalore  - Bangalore Chapter Development Guide Testing Guide Open Source Tools
OWASP Body of Knowledge Core Application  Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure  Web Applications and Web Services Guide to Application Security Testing and  Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)
Thank You

More Related Content

PDF
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
PPTX
Agile and Secure Development
PDF
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
DOCX
Vipin_Pandey
PPTX
Unit testing : what are you missing for security
PPTX
Top 10 static code analysis tool
PPTX
Computer software specialists wikki verma
АНТОН МУЖАЙЛО «Test Team Development and Management Techniques»
Agile and Secure Development
АННА ТИМОФІЄВА & СЕРГІЙ МАЛИНОВСЬКИЙ «Tools and Tips of video connection test...
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Vipin_Pandey
Unit testing : what are you missing for security
Top 10 static code analysis tool
Computer software specialists wikki verma

What's hot (19)

PDF
Test Driven Development
PPTX
Code Review tool for personal effectiveness and waste analysis
PPTX
Doing Security Testing in Agile with ease
PDF
Top 50 Software Testing Interview Questions & Answers | Edureka
PPTX
SonarQube: Continuous Code Inspection
PPTX
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
PDF
LF_APIStrat17_Bulletproofing Your API's
DOC
Resume_sri
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PPTX
DevSecOps: Securing Applications with DevOps
PPTX
Code Review
PDF
Resume
PPTX
DevSecOps - It can change your life (cycle)
PDF
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
PDF
Code Review for iOS
PDF
Code Review: How and When
PPTX
Code Review Best Practices
DOCX
Code review guidelines
PPTX
Test Driven Development
Code Review tool for personal effectiveness and waste analysis
Doing Security Testing in Agile with ease
Top 50 Software Testing Interview Questions & Answers | Edureka
SonarQube: Continuous Code Inspection
How To Learn Programming For Beginners | How To Start Coding | Learn Programm...
LF_APIStrat17_Bulletproofing Your API's
Resume_sri
Static Application Security Testing Strategies for Automation and Continuous ...
DevSecOps: Securing Applications with DevOps
Code Review
Resume
DevSecOps - It can change your life (cycle)
Sec4dev 2021 - Catch Me If You can : Continuous Delivery vs. Security Assurance
Code Review for iOS
Code Review: How and When
Code Review Best Practices
Code review guidelines
Ad

Similar to Cost effective web application testing (20)

PDF
OWASP-Web-Security-testing-4.2
PPTX
Integrating security into the application development process
PDF
Owasp testing guide_v4
PDF
Owasp testing guide_v4
PDF
OWASP Testing Guide 4.0
PPT
六合彩香港-六合彩
PPTX
Hacker vs Tools: Which to Choose?
PPTX
Hacker vs tools
PPT
Software Security Engineering
PPT
Owasp Eu Summit 2008 Owasp Testing Guide V3
PPT
OWASP Testing Guide v3
PPTX
Testing web based applications
KEY
improving the performance of Rails web Applications
PDF
Ibm עמרי וייסמן
PDF
Omri
PDF
Ibm עמרי וייסמן
PPT
Secure SDLC for Software
PDF
Application Security Testing for Software Engineers: An approach to build sof...
PDF
CTU June 2011 - Things that Every ASP.NET Developer Should Know
OWASP-Web-Security-testing-4.2
Integrating security into the application development process
Owasp testing guide_v4
Owasp testing guide_v4
OWASP Testing Guide 4.0
六合彩香港-六合彩
Hacker vs Tools: Which to Choose?
Hacker vs tools
Software Security Engineering
Owasp Eu Summit 2008 Owasp Testing Guide V3
OWASP Testing Guide v3
Testing web based applications
improving the performance of Rails web Applications
Ibm עמרי וייסמן
Omri
Ibm עמרי וייסמן
Secure SDLC for Software
Application Security Testing for Software Engineers: An approach to build sof...
CTU June 2011 - Things that Every ASP.NET Developer Should Know
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing

Cost effective web application testing

  • 1. Cost Effective Web Application Testing Hari Pudipeddi www.harinathpv.com harinath@dazasya.in
  • 2. What is Inside? What are Web Applications? History… Architecture of Web Applications Testing Web Applications Testing Techniques Test effort in SDLC Tips to speed up your Web App Free Web Testing Tools Introducing OWASP OWASP BoK Q&A
  • 3. What are Web Applications?
  • 4. History… First Generation No Sophistication Simple form submissions CGI (Common Gateway Interface) 1993 – Late 1990’s Encapsulating user data in environ variables Hotmail Filters Control access to web site, implement a new framework, or provide security Live within the execution context of web server Apache web server modules Scripting Scripting languages run code within the web server without being compiled
  • 5. History… Flaws of Scripting Not strongly typed and do not support good programming practices Generally optimized for particular types of data manipulation. Choosing the wrong scripting language hits on the performance of the application. It’s difficult (not impossible) to write multi-tier large scale applications Most of them do not support remote method or web service calls Web Application Frameworks J2EE ASP.NET
  • 6. Architecture of Web Application
  • 7. Testing Web Applications No Silver Bullet Think Strategically Align with the SDLC Test early and Test often Understand the end-user System configuration Repetitive requests Use the Right TOOLS Perform White Box Review Code as much as possible Develop appropriate metrics for your application
  • 8. Testing Techniques Manual Inspections & Reviews Threat Modeling Pro’s Con’s No supporting technology Can be used to a variety of situations Flexible Early in SDLC Promotes Teamwork Time Consuming Supporting material not available Required significant human thought and skill Pro’s Con’s Practical attackers view of the system Flexible Early in SDLC Relatively New Technique Good threat models do not mean good software 
  • 9. Testing Techniques Source Code Review Penetration Testing Pro’s Con’s Completeness and Effectiveness Accuracy Fast Requires highly skilled developers Can miss issues in libraries Cannot detect run-time errors Code analyzed can be difference from code used. Pro’s Con’s Can be fast and therefore cheaper Lower skill set than Code Review Tests code which is actually exposed Too late in SDLC Front impact testing only
  • 10. Test Effort in SDLC Test Effort in Test Technique
  • 11. Testing Web Applications – Tips to Speed Minimize HTTP Requests Design an Appropriate Content Delivery Network Expires/Cache – Control Header Gzip Components Stylesheets go up Scripts go down JavaScript and CSS go out Minimize JavaScript and CSS Reduce DNS lookup’s Avoid Re-directs Configure ETag’s Make Ajax Cacheable
  • 12. Free Web Testing Tools Jmeter - - Functionality and Performance QASL – Create automated web application tests HTTP Test Tool – Scriptable Test Tool for HTTP Protocol solutions Tellurium – UI based module testing framework Badboy – Record/Playback, Load Testing
  • 13. OWASP – The Open Web Application Security Project www.OWASP.org – Founded in 2001 http://www.owasp.org/index.php/Bangalore - Bangalore Chapter Development Guide Testing Guide Open Source Tools
  • 14. OWASP Body of Knowledge Core Application Security Knowledge Base Acquiring and Building Secure Applications Verifying Application Security Managing Application Security Application Security Tools AppSec Education and CBT Research to Secure New Technologies Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Foundation 501c3 OWASP Community Platform (wiki, forums, mailing lists) Projects Chapters AppSec Conferences Guide to Building Secure Web Applications and Web Services Guide to Application Security Testing and Guide to Application Security Code Review Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Web Based Learning Environment and Guide for Learning Application Security Guidance and Tools for Measuring and Managing Application Security Research Projects to Figure Out How to Secure the Use of New Technologies (like Ajax)