Indeed penetration is only an appropriate technique to test the security of web applications under certain circumstances. Introduction Penetration testing will never be an exact science where a complete list of all possible issues that should be tested can de defined. 16 Appendix A - The OASIS WAS Vulnerability Types. 4 About the OWASP Testing Project (Parts One and Two). 3 Using this Checklist as an RFP Template. You should read and understand that license and copyright conditions. The OWASP Web Application Penetration Check List This document is released under the GNU documentation license and is Copyrighted to the OWASP Foundation. OWASP Web Application Penetration Checklist Version 1.1
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |