Difference between revisions of "Web Application Penetration Testing"

From OWASP
Jump to: navigation, search
(Final edit)
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
{{Template:OWASP Testing Guide v4}}
 
{{Template:OWASP Testing Guide v4}}
  
The following paragraphs describe the Web Application Penetration Testing Methology, split into the 11 subcategories:
+
The following sections describe the 12 subcategories of the  Web Application Penetration Testing Methodology:
  
 
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']]
 
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']]
Line 23: Line 23:
 
[[Cryptography|'''4.10 Cryptography''']]
 
[[Cryptography|'''4.10 Cryptography''']]
  
[[Testing for business logic|'''4.11 Business Logic Testing (OWASP-BL-001)''']]  
+
[[Testing for business logic|'''4.11 Business Logic Testing ''']]  
  
[[Client Side Testing|'''4.12 Client Side Testing''']] [New!]
+
[[Client Side Testing|'''4.12 Client Side Testing''']]

Revision as of 03:06, 13 May 2014

This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project


The following sections describe the 12 subcategories of the Web Application Penetration Testing Methodology:

4.1 Introduction and Objectives

4.2 Information Gathering

4.3 Configuration and Deploy Management Testing

4.4 Identity Management Testing

4.5 Authentication Testing

4.6 Authorization Testing

4.7 Session Management Testing

4.8 Data Validation Testing

4.9 Error Handling

4.10 Cryptography

4.11 Business Logic Testing

4.12 Client Side Testing