#30 DAYS OF TESTING ##ONE BIG CHALLENGE.
Inspired by the Ministry of Testing 30 day challenge this repo is intended to help track and share your progress. Fork as required and create Task checkins with proof as you achieve tick off your testing challenges!
Be sure to share your progress!(create links from the table below to the readme documenting the challenge you just completed) And don't forget to use the #30DAYSOFTESTING
#Test Challenges! Complete in any order you like!
- Read a security blog
- Select and read a book related to security testing.
- Use a security tool - Examples: ZAP or BurpSuite.
- Learn anything about Vulnerability Scanning.
- Learn about Threat Modelling (ie like the STRIDE Model).
- Explore these sites: Google gruyere; HackYourself First; Ticket Magpie; The BodgeIt store.
- Learn one or more things about Penetration testing.
- Use a proxy tool to observe web traffic in a web or mobile application.
- Discover the process and procedures around Security Auditing.
- Read and Learn about Ethical hacking.
- Try to figure out the Posture Assessment for an application.
- Read about security testing and discuss where it best fits in an SDLC.
- Perform a Security analysis for requirements in a story.
- Develop a test plan including security tests.
- Write and share ideas for security testing via twitter or a blog
- Research how to build a Tiger Box.
- Research a recent hack/security breach
- Learn about Security Headers.
- Research Script Kiddies and/or packet monkeys.
- Read about DOS/DDOS attacks. Share examples/stories via social media.
- Read about network vulnerability and apply it to your tech stack.
- Read about System Software Security and apply it to your tech stack.
- What are the top 10 security threats of 2016?
- Use a suggestion from the OWASP Web Application Security Checklist.
- Find and use a mobile security tool.
- Compare and contrast, on social media, web and mobile security testing.
- How could BYOA (bring your own application) play a part in security?
- Share security testing ideas for specific domains
- Research security regulations regarding a specific domain.
- Discover the difference between White, Grey, and Black Hat Hacking.
- BONUS: Take part in a bug bounty.
#Source