{"version":"1.0","provider_name":"Shakebug - Blog","provider_url":"https:\/\/www.shakebug.com\/blog","author_name":"Chirag Lukhi","author_url":"https:\/\/www.shakebug.com\/blog\/author\/ichirag\/","title":"What are some Software Testing Attacks that can be used in black box testing? - Shakebug - Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ggFjRJpNoo\"><a href=\"https:\/\/www.shakebug.com\/blog\/software-testing-attacks-used-in-black-box-testing\/\">What are some Software Testing Attacks that can be used in black box testing?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.shakebug.com\/blog\/software-testing-attacks-used-in-black-box-testing\/embed\/#?secret=ggFjRJpNoo\" width=\"600\" height=\"338\" title=\"&#8220;What are some Software Testing Attacks that can be used in black box testing?&#8221; &#8212; Shakebug - Blog\" data-secret=\"ggFjRJpNoo\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.shakebug.com\/blog\/wp-content\/uploads\/2024\/01\/software-testing-attacks-used-in-black-box-testing.png","thumbnail_width":750,"thumbnail_height":350,"description":"Boundary Value Analysis (BVA): Attack : A type of attack that can be used in black box testing is boundary value analysis (BVA). Examining the boundaries between valid and invalid input values, as well as analyzing how the system responds to those inputs, is part of this technique. Objective BVA assists testers in identifying potential [&hellip;]"}