19 Attacks for Breaking Software Applications19 Attacks for Breaking Applications

Security Innovation's testing techniques are derived from industry leading research and our top-selling book "How to Break Software Security.” In this whitepaper, we present 19 attacks that will uncover elusive vulnerabilities on any kind of application, platform, and development language.

Key highlights include attacks using: 

  • Software Dependencies
  • User Interface
  • Design
  • Implementation
  • ...and more!

Our 19 attacks described in this whitepaper are practical, effective and based on years of research into software security defects. These attacks are used by thousands of developers and testers worldwide. They are also the cornerstone of Security Innovation's methodology that subsumes all other security standards, including the OWASP top ten, and we pass them along to you for use in your security testing efforts!