Security Testing for Functional QA: Finding Vulnerabilities Without Being a Pentester

  • 40 min

Every QA professional has heard of security testing, but most consider it the job of specialised professionals — penetration testers. But what if a regular tester can and should contribute to product security?

In this talk, I'll demonstrate how a functional tester without deep security expertise can identify real vulnerabilities using basic principles and common mistakes. 

Using examples from a real project, I'll examine key vulnerability classes from the OWASP Top 10 — from Broken Access Control to SSRF —and show how they can be identified through simple but systematic checks.

You'll learn how to introduce “security hygiene” into the daily work of a QA team, and why even minimal efforts can prevent serious incidents.

This talk is based on practical experience: over the course of several months, a team of testers identified more than 15 vulnerabilities without specialised tools or access to the internal codebase.

Comments ({{Comments.length}})
  • {{comment.AuthorFullName}}
    {{comment.AuthorInfo}}
    {{ comment.DateCreated | date: 'dd.MM.yyyy' }}

To leave a feedback you need to

or
Chat with us, we are online!