Skip to content

Monthly Archives: July 2011

White-box Testing Quick Tips – Web Application

Follow Me

SanthoshTuppad

Software Tester, Product Innovator, Security Enthusiast at Test Insane Software Testing Services
I have been as a software tester for over 5 years. I am a hands-on tester and I've been winning bug battles & testing competitions across the world. I am a testing enthusiast, who conducts free workshops on security testing across India (Covered locations: Bengaluru, Pune, Hyderabad & Chennai. Invite him to come to your location), and monthly meets for testers in Bengaluru. I am also an avid testing blogger.

My interests include traveling, driving my SUV, health & fitness and many others. I mentor budding entrepreneurs, testers, teams in any profession.
Follow Me

Latest posts by SanthoshTuppad (see all)

There are many things that a tester has to do while testing the code and performing white-box testing. For instance, a tester will need to read, understand and analyze the code; find code optimization bugs and coding standards related to bugs; find hard-coded fixes; find security vulnerabilities in the code and suggest countermeasures for them. […]

Share/Bookmark

Man in the Middle Attack

Follow Me

SanthoshTuppad

Software Tester, Product Innovator, Security Enthusiast at Test Insane Software Testing Services
I have been as a software tester for over 5 years. I am a hands-on tester and I've been winning bug battles & testing competitions across the world. I am a testing enthusiast, who conducts free workshops on security testing across India (Covered locations: Bengaluru, Pune, Hyderabad & Chennai. Invite him to come to your location), and monthly meets for testers in Bengaluru. I am also an avid testing blogger.

My interests include traveling, driving my SUV, health & fitness and many others. I mentor budding entrepreneurs, testers, teams in any profession.
Follow Me

Latest posts by SanthoshTuppad (see all)

This is a type of security exploit and I see that most of the applications suffer from this attack. In short, I will refer to this attack as MITMA henceforth in this blog post.   How does this work? There are two parties which are your web browser and server. So the man in the […]