30 Days of Security Testing
New year, new challenge!
Below is an image with the list of challenges for each day of the month. Save it somewhere. Print it out. Stick it on your wall. Let’s do this?
What are the rules?
We have a list of 30 challenges, plus a bonus one Each one has a number. The goal is to tick off as many of the challenges as you can within your own specified timeframe.
You can do this in your own time, or you can join us as a community and share your results or progress. You may have an image to share, a blog post, a video, status update, whatever it is! Come and participate!
Here is how you can share your progress:
- On our MoT Slack, request an invite if you are not there.
- On Instagram, Twitter, LinkedIn – use the #30DaysOfTesting hashtag
- On our 30 Days of Testing category at The Club
WARNING: Hacking is illegal. Ministry of Testing does not advocate or condone illegal hacking. Some of these suggestions should be done in safe environments or with the express permission of the websites or applications under test. Try: Hack Yourself First if you need a safe environment to test with.
30 Days Of Security Testing, the text version:
- Read a security blog
- Select and read a book related to security testing.
- Use a security tool - Examples: ZAP or BurpSuite.
- Learn anything about Vulnerability Scanning.
- Learn about Threat Modelling (ie like the STRIDE Model).
- Explore these sites: Google gruyere; HackYourself First; Ticket Magpie; The BodgeIt store.
- Learn one or more things about Penetration testing.
- Use a proxy tool to observe web traffic in a web or mobile application.
- Discover the process and procedures around Security Auditing.
- Read and Learn about Ethical hacking.
- Try to figure out the Posture Assessment for an application.
- Read about security testing and discuss where it best fits in an SDLC.
- Perform a Security analysis for requirements in a story.
- Develop a test plan including security tests.
- Write and share ideas for security testing via twitter or a blog
- Research how to build a Tiger Box.
- Research a recent hack/security breach
- Learn about Security Headers.
- Research Script Kiddies and/or packet monkeys.
- Read about DOS/DDOS attacks. Share examples/stories via social media.
- Read about network vulnerability and apply it to your tech stack.
- Read about System Software Security and apply it to your tech stack.
- What are the top 10 security threats of 2016?
- Use a suggestion from the OWASP Web Application Security Checklist.
- Find and use a mobile security tool.
- Compare and contrast, on social media, web and mobile security testing.
- How could BYOA (bring your own application) play a part in security?
- Share security testing ideas for specific domains
- Research security regulations regarding a specific domain.
- Discover the difference between White, Grey, and Black Hat Hacking.
- BONUS: Take part in a bug bounty.