Difference between revisions of "Testing: Introduction and objectives"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]<br>
 
[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]<br>
 
{{Template:OWASP Testing Guide v2}}
 
{{Template:OWASP Testing Guide v2}}
{{Template:Need Editor Testing}}
+
 
 +
This Chapter will describe the OWASP Web Application Penetration testing methology and it will explain how to test each vulnerabilities.
 +
 
 +
What is penetration testing?
 +
 
 +
 
 +
What is a vulnerability?
 +
 
 +
What is the list of OWASP testing?
 +
 
 +
Penetration testing will never be an exact science where a complete list of all possible issues that should be tested can be defined. Indeed, penetration testing is only an appropriate technique for testing the security of web applications under certain circumstances.
 +
Our goal is to collect all the possible testing techniques, explain it and mantain it updated.
 +
 
 
{{Template:Stub}}
 
{{Template:Stub}}

Revision as of 09:08, 18 October 2006

[Up]
OWASP Testing Guide v2 Table of Contents


This Chapter will describe the OWASP Web Application Penetration testing methology and it will explain how to test each vulnerabilities.

What is penetration testing?


What is a vulnerability?

What is the list of OWASP testing?

Penetration testing will never be an exact science where a complete list of all possible issues that should be tested can be defined. Indeed, penetration testing is only an appropriate technique for testing the security of web applications under certain circumstances. Our goal is to collect all the possible testing techniques, explain it and mantain it updated.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.