Difference between revisions of ".NET Penetration Testing"

From OWASP
Jump to: navigation, search
(Blogs, Articles & Projects)
Line 29: Line 29:
  
 
[http://blogs.microsoft.co.il/blogs/alikl/archive/2006/12/29/Wrong-Way-To-Do-Penetration-Testing.aspx Wrong Way to Do Penetration Testing]
 
[http://blogs.microsoft.co.il/blogs/alikl/archive/2006/12/29/Wrong-Way-To-Do-Penetration-Testing.aspx Wrong Way to Do Penetration Testing]
 
  
 
===Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)===
 
===Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)===

Revision as of 09:24, 30 June 2008

.NET Security Quick Reference

.NET Penetration Testing

Plan, Discover, Attack and Report - this section is for tools, checklists and references for penetration testing .NET web applications and services.

Areas of Concern

  • Planning the hack
  • Ethically hacking
  • Attack Vectors
  • Intelligence gathering
  • Reporting

Blogs, Articles & Projects

OWASP .NET Vulnerability Research

MSDN Hackers

MSDN Magazine: Security Briefs: Penetration Testing

Wrong Way to Do Penetration Testing

Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)

MSDN Webcast: Penetration Testing with Visual Studio Team System and Fortify Security Tester

Penetration for Web Applications Part 1 (PDF)

Penetration for Web Applications Part 1 (PDF)

References

Rooting the CLR (Draft)

NIST 800-42 Guideline on Network Security Testing

ISECOM Open Source Security Testing Methodology Manual

OISSG Information Systems Security Assessment Framework (ISSAF)

Tools

Source Code Audit Tools