Background of the question
With the rise in cyberattacks, the emphasis on security testing has intensified. Even for manual testers, it's important to be able to identify standard vulnerabilities.
Problem
Often, manual testers consider security issues to be the responsibility of automation engineers or security specialists. This leads to the oversight of basic bugs that can be fatal for the business.
Solution
Manual security testing is an attempt to reproduce potential attacks from the perspective of a regular user:
All found issues must be documented using a "Bug Report" template with a detailed description of the step, expected and actual results, as well as criticality level.
Key features:
Can all critical vulnerabilities in the application be identified manually?
No. A manual approach allows for finding obvious vulnerabilities, but full coverage requires automated scanners and pentesting.
Is it sufficient to check only the login and password form for security testing?
No. All functional modules need to be checked, especially those that modify/store data, interactions with APIs, file uploads, and operations involving access rights.
Does a tester need to understand HTTP requests and responses when it comes to manual security testing?
Yes. Working with tools like DevTools, Postman, or Fiddler is key to finding security issues manually.
The tester only checked the login for XSS without testing other user forms and URL parameters.
Pros:
Cons:
The tester systematically checked all input forms, altered parameters in requests, detailed the findings in a bug report, and consulted with DevOps regarding error handling.
Pros:
Cons: