<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=How_To_Blackbox_Test_Almost_Anything</id>
		<title>How To Blackbox Test Almost Anything - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=How_To_Blackbox_Test_Almost_Anything"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_To_Blackbox_Test_Almost_Anything&amp;action=history"/>
		<updated>2026-04-11T05:01:51Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_To_Blackbox_Test_Almost_Anything&amp;diff=66478&amp;oldid=prev</id>
		<title>Dhruvsoi: Created page with 'Taking over your iphone with an SMS message. Running code on Oracle server using just a browser. Creating a PDF file that contains a hidden Trojan horse. Causing ATM machines to …'</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_To_Blackbox_Test_Almost_Anything&amp;diff=66478&amp;oldid=prev"/>
				<updated>2009-07-24T06:57:31Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;#039;Taking over your iphone with an SMS message. Running code on Oracle server using just a browser. Creating a PDF file that contains a hidden Trojan horse. Causing ATM machines to …&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Taking over your iphone with an SMS message. Running code on Oracle server using just a browser. Creating a PDF file that contains a hidden Trojan horse. Causing ATM machines to spit out unlimited cash. These types of security weaknesses are discovered all the time (those are just examples from the last few months), and it seems that just about any device that runs code can be hacked. But how are those hacks discovered? And most importantly: How can we detect weaknesses in our own products and applications so that we can fix them before the &amp;quot;bad guys&amp;quot; get there? Answer: by using the same tools the bad guys do.&lt;br /&gt;
&lt;br /&gt;
This presentation will talk about the performing security testing without needing the source code, whether we are testing software, hardware, appliances or remote services.&lt;br /&gt;
&lt;br /&gt;
We will mainly discuss blackbox testing by &amp;quot;fuzzing&amp;quot; - the technique used by the 'black hat' hackers and is credited for uncovering most of the security holes that are discovered today.&lt;/div&gt;</summary>
		<author><name>Dhruvsoi</name></author>	</entry>

	</feed>