Difference between revisions of "Web Application Penetration Testing"

From OWASP
Jump to: navigation, search
m (fix repeated 4.5 section)
Line 5: Line 5:
 
[[Testing: Information Gathering|'''4.2 Information Gathering''']]
 
[[Testing: Information Gathering|'''4.2 Information Gathering''']]
  
[[Testing for Configuration Management|4.3 Configuration Management Testing]]
+
[[Testing_for_configuration_management|4.3 Configuration Management Testing]]
  
 
[[Testing for business logic|'''4.4 Business logic testing''']]
 
[[Testing for business logic|'''4.4 Business logic testing''']]

Revision as of 07:22, 22 August 2008

In the following paragraphs, it is described the Web Application Penetration Testing Methology, split into the 10 subcategories:

4.1 Introduction and Objectives

4.2 Information Gathering

4.3 Configuration Management Testing

4.4 Business logic testing

4.5 Authentication Testing

4.6 Authorization Testing

4.7 Session Management Testing

4.8 Data Validation Testing

4.9 Testing for Denial of Service

4.10 Web Services Testing

4.11 Client Side Testing