Difference between revisions of "Web Application Penetration Testing"

From OWASP
Jump to: navigation, search
Line 23: Line 23:
 
[[Cryptography|'''4.10 Cryptography''']]
 
[[Cryptography|'''4.10 Cryptography''']]
  
[[Testing for business logic|'''4.11 Business Logic Testing (OWASP-BL-001)''']]  
+
[[Testing for business logic|'''4.11 Business Logic Testing ''']]  
  
[[Client Side Testing|'''4.12 Client Side Testing''']] [New!]
+
[[Client Side Testing|'''4.12 Client Side Testing''']]

Revision as of 18:00, 8 March 2014

This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project


The following paragraphs describe the Web Application Penetration Testing Methodology, split into the 12 subcategories:

4.1 Introduction and Objectives

4.2 Information Gathering

4.3 Configuration and Deploy Management Testing

4.4 Identity Management Testing

4.5 Authentication Testing

4.6 Authorization Testing

4.7 Session Management Testing

4.8 Data Validation Testing

4.9 Error Handling

4.10 Cryptography

4.11 Business Logic Testing

4.12 Client Side Testing