Dynamic program analysis

Dynamic application security testing

A dynamic application security testing (DAST) is a non functional testing process where one can assess an application using certain techniques and the end result of such testing process covers security weaknesses and vulnerabilities present in an application. This testing process can be carried out either in manual way or by using automated tools. Manual assessment of an application involves a more human intervention to identify the security flaws which might slip from an automated tool. Usually business logic errors, race condition checks, and certain zero day vulnerabilities can only be identified using manual assessments. On the other side, a DAST tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike static application security testing tools, DAST tools do not have access to the source code and therefore detect vulnerabilities by actually performing attacks. DAST tools allow sophisticated scans, detecting vulnerabilities with minimal user interactions once configured with host name, crawling parameters and authentication credentials. These tools will attempt to detect vulnerabilities in query strings, headers, fragments, verbs (GET/POST/PUT) and DOM injection. (Wikipedia).

Video thumbnail

OWASP AppSecUSA 2012: Interactive Application Security Testing(IAST), Beyond SAST/DAST

Speaker: Ofer Maor Until recently, SAST/DAST dominated the application security testing market, each with its own pros and cons. We present IAST, a completely new approach - analyzing code execution, memory and data in runtime, allowing for accurate inspection of the application. We will

From playlist OWASP AppSecUSA 2012

Video thumbnail

Application Security Tutorial | Application Security Basics | Cyber Security Tutorial | Simplilearn

In this application tutorial, we will cover application security basics in this cyber security tutorial. We will cover the basic definitions of application security, along with the different types and categories of application security. Next we cover the common application security vulnera

From playlist Cyber Security Playlist [2023 Updated]馃敟

Video thumbnail

CERIAS Security: Robustness testing - black-box testing for software security 6/6

Clip 6/6 Speaker: Ari Takanen 路 Codenomicon Ltd. The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method pr

From playlist The CERIAS Security Seminars 2004

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

CERIAS Security: Robustness testing - black-box testing for software security 4/6

Clip 4/6 Speaker: Ari Takanen 路 Codenomicon Ltd. The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method pr

From playlist The CERIAS Security Seminars 2004

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

GORUCO 2016 - Symmetric API Testing by Aditya Mukerjee

Symmetric API Testing by Aditya Mukerjee When implementing REST API servers and clients, testing is critical. Symmetric API testing is a design pattern that ensures compatibility between client and server with transparent tests. Testing APIs symmetrically reduces build times and code comp

From playlist GORUCO 2016

Video thumbnail

CERIAS Security: Robustness testing - black-box testing for software security 5/6

Clip 5/6 Speaker: Ari Takanen 路 Codenomicon Ltd. The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method pr

From playlist The CERIAS Security Seminars 2004

Video thumbnail

CERIAS Security: Robustness testing - black-box testing for software security 3/6

Clip 3/6 Speaker: Ari Takanen 路 Codenomicon Ltd. The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method pr

From playlist The CERIAS Security Seminars 2004

Video thumbnail

DEFCON 15: Comparing Application Security Tools

Speaker: Edward Lee Security Researcher, Fortify Software If you're going to buy an application security tool, which one will it be? Every vendor likes to talk about how their tools are the best. "We are the market leader!" they all say. But not everyone can lead all the time. I will show

From playlist DEFCON 15

Video thumbnail

Cyber Security Interview Questions Part - 2 | Software Programming Interview Questions | Simplilearn

This video on cybersecurity interview questions part 2 will focus on software and programming questions. Here, we will look at questions related to use-case testing, C, C++, Java, static and dynamic testing, and many more. 馃敟Enroll for Free Cyber Security Course & Get Your Completion Certif

From playlist Cyber Security Playlist [2023 Updated]馃敟

Video thumbnail

OWASP AppSec EU 2013: Do You Have a Scanner or a Scanning Program?

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speaker: Dan Cornell By this point, most organizations have acquired at least one code or application scanning technology to incorporate into their sof

From playlist OWASP AppSec EU 2013

Video thumbnail

RailsConf 2019 - No Such Thing as a Secure Application by Lyle Mullican

RailsConf 2019 - No Such Thing as a Secure Application by Lyle Mullican _______________________________________________________________________________________________ Cloud 66 - Pain Free Rails Deployments Cloud 66 for Rails acts like your in-house DevOps team to build, deploy and maint

From playlist RailsConf 2019

Video thumbnail

27c3: I Control Your Code (en)

Speaker: Mathias Payer Attack Vectors Through the Eyes of Software-based Fault Isolation Unsafe languages and an arms race for new bugs calls for an additional line of defense in software systems. User-space virtualization uses dynamic instrumentation to detect different attack vectors a

From playlist 27C3: We come in peace

Video thumbnail

BASHing iOS Applications - Jason Haddix, Dawn Isabel

BASHing iOS Applications: dirty, s*xy, cmdline tools for mobile auditors - Jason Haddix, Dawn Isabel The toolchain for (binary) iOS application assessment is weak BUT, like an island of misfit toys, there can be stregnth in numbers. Join us as we explore what actually needs to be done in

From playlist AppSecUSA 2013

Video thumbnail

OWASP AppSec 2010: Application Security Scoreboard in the Sky 1/3

Clip 1/3 Speaker: Chris Eng, Veracode his presentation will discuss vulnerability metrics gathered from real-world applications. The statistics are derived from continuously updated data collected by Veracode's cloud-based code analysis service. The anonymized data represents a total of n

From playlist OWASP AppSec 2010

Video thumbnail

DevOpsDays Boston 2019 - DevSecOps - Automating Security in DevOps by Anand Tiwari

DevSecOps - Automating Security in DevOps by Anand Tiwari As part of this workshop attendees will receive a state-of-the-art DevSecOps tool-chest comprising of various open-source tools and scripts to help the DevOps engineers in automating security within the CI/CD pipeline. While the wo

From playlist DevOpsDays Boston 2019

Video thumbnail

CERIAS Security: Robustness testing - black-box testing for software security 2/6

Clip 2/6 Speaker: Ari Takanen 路 Codenomicon Ltd. The robustness testing method is based on systematic creation of a very large number of communication protocol messages containing exceptional data elements and structures simulating malicious attacks or corrupted traffic. The method pr

From playlist The CERIAS Security Seminars 2004

Video thumbnail

OWASP AppSecUSA 2011: CloudSec 12-Step

Speaker: Adrian Lane Do you think cloud security is mainframe computing all over again? Is Azure security just like Windows security? If so, then join me for CloudSec Anonymous, a 12-step program for those of you who want to understand what's different about cloud security. This presentat

From playlist OWASP AppSecUSA 2011

Related pages

Static application security testing