Difference between revisions of "OWASP Testing Project Roadmap"

From OWASP
Jump to: navigation, search
 
(One intermediate revision by one user not shown)
Line 1: Line 1:
 
The project's overall goal is to...
 
The project's overall goal is to...
  
'''be a reference document for the purpose of performing code review. This project shall provide examples in the most common web application development languages (Java and C# .NET)'''
+
'''be a reference document for the purpose of performing penetration testing. This project shall provide examples of the most common web application vulnerabilities and attacks.'''
  
 
In the near term, we are focused on the following tactical goals...
 
In the near term, we are focused on the following tactical goals...
  
1. '''Looking at each attack type and examine the anti-pattern associated with the vulnerability which makes the attack possible. This shall include code examples to guide a reviewer on what to look for.'''
+
1. '''Looking at each attack type and examine the method of testing to verify if the vulnerability exists.'''
  
2. '''Looking at the code review process, how it is managed and challanges one may encounter when performing code review in the "real world"'''
+
2. '''Examining other technical and non technical methods to examing and find vulnerabilities in applications.'''
 +
 
 +
3. '''Discussing the OWASP testing framework and how it can help one to cover all the based when performing a pen test or risk assessment.'''
 +
 
 +
4. '''The Live CD in conjunction with Packetfocus.com. This aims to be the paramount Live CD for application security testing, code review, learning, and saving the world!'''
  
3. '''Looking at the code review tools available and discussing the benefits and issues of using tools'''
 
  
 
[[Category:OWASP Testing Project]]
 
[[Category:OWASP Testing Project]]

Latest revision as of 17:00, 31 July 2006

The project's overall goal is to...

be a reference document for the purpose of performing penetration testing. This project shall provide examples of the most common web application vulnerabilities and attacks.

In the near term, we are focused on the following tactical goals...

1. Looking at each attack type and examine the method of testing to verify if the vulnerability exists.

2. Examining other technical and non technical methods to examing and find vulnerabilities in applications.

3. Discussing the OWASP testing framework and how it can help one to cover all the based when performing a pen test or risk assessment.

4. The Live CD in conjunction with Packetfocus.com. This aims to be the paramount Live CD for application security testing, code review, learning, and saving the world!