OWASP_Testing_Guide_-_OWASP_Summit_2011

OWASP_Testing_Guide_-_OWASP_Summit_2011

ID:40086928

大小:2.37 MB

页数:21页

时间:2019-07-20

OWASP_Testing_Guide_-_OWASP_Summit_2011_第1页
OWASP_Testing_Guide_-_OWASP_Summit_2011_第2页
OWASP_Testing_Guide_-_OWASP_Summit_2011_第3页
OWASP_Testing_Guide_-_OWASP_Summit_2011_第4页
OWASP_Testing_Guide_-_OWASP_Summit_2011_第5页
资源描述:

《OWASP_Testing_Guide_-_OWASP_Summit_2011》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、PlanningtheOWASPTestingGuidev4MatteoMeucci,GiorgioFedon,PavolLuptakAGENDA•FewwordsabouttheTGhistoryandadoptionbytheCompanies•WhyweneedtheCommonNumberingandCommonVulnerabilitylist•Updatethesetoftest•V4RoadmapWhatistheOWASPTestingGuide?Wherearewenow?TestingGuidehistory•J

2、anuary2004–"TheOWASPTestingGuide",Version1.0•July14,2004–"OWASPWebApplicationPenetrationChecklist",Version1.1•December25,2006–"OWASPTestingGuide",Version2.0•December16,2008–"OWASPTestingGuide",Version3.0–ReleasedattheOWASPSummit08ProjectComplexityPages400350300250200Pa

3、ges150100500v1v1.1v2v3OWASPTestingGuidev3•SANSTop202007•NIST“TechnicalGuidetoInformationSecurityTesting(Draft)”•GaryMcGraw(CTOCigital)says:“InmyopinionitisthestrongestpieceofIntellectualPropertyintheOWASPportfolio”–OWASPPodcastbyJimManicoTestingGuidev3:Index1.Frontispi

4、ece2.Introduction3.TheOWASPTestingFramework4.WebApplicationPenetrationTesting5.WritingReports:valuetherealriskAppendixA:TestingToolsAppendixB:SuggestedReadingAppendixC:FuzzVectorsAppendixD:EncodedInjectionWhatarethedifferencebetweentheOWASPTestingGuideandanotherbookabo

5、utWebAppPenTesting?WebApplicationPenetrationTesting•OWASPTestingGuideisdrivenbyourCommunity•It’srelatedtotheotherOWASPguides•Ourapproachinwritingthisguide–Open–Collaborative•Definedtestingmethodology–Consistent–Repeatable–Underquality9TestingGuideCategories&vulnerabili

6、tylistWhatweneednowtoimprovethev3andplanthev4?OWASPCommonVulnerabilityListWeneedacommonvulnerabilitylist12LookingattheTestingGuideCategories&vulnerabilitylistThenewteamAndrewMullerMikeHryekewiczAungKhAntNickFreemanCecilSuNorbertSzeteiColinWatsonPaoloPeregoDanielCuthber

7、tPavolLuptakGiorgioFedonPsiinonJasonFloodRaySchippersJavierMarcosdePradoRobertSmithJuanGalianaLaraRobertWinkelKenanGursoyRobertoSuggiLiveraniKevinHorvatSebastienGioriaLodeVanstechelmanStefanoDiPaolaMarcoMoranaSumitSiddharthMattChurchyThomasRyanMatteoMeucciTimBertelsMic

8、haelBomanTripurariRaiWagnerEliasProposedv4list:let’sdiscussitCategoryVulnerabilitynameWhereimplementedSourceInformati

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
相关文章
更多
相关标签