<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Gatestone</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Gatestone"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Gatestone"/>
		<updated>2026-04-28T10:07:39Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WebGoat_User_Guide_Objectives&amp;diff=38832</id>
		<title>WebGoat User Guide Objectives</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WebGoat_User_Guide_Objectives&amp;diff=38832"/>
				<updated>2008-09-08T11:13:55Z</updated>
		
		<summary type="html">&lt;p&gt;Gatestone: Corrected wording&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[WebGoat User Guide Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
Having followed the testing techniques within WebGoat, a tester should be able to:&lt;br /&gt;
* Understand the high-level interaction processes within a web-application&lt;br /&gt;
* Determine information in client visible data that can be useful in an attack&lt;br /&gt;
* Identify and understand data and user interactions which may expose the application to attack&lt;br /&gt;
* Perform tests against those interactions to expose flaws in their operation&lt;br /&gt;
* Execute attacks against the application to demonstrate and exploit vulnerabilities&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP WebGoat Project]]&lt;/div&gt;</summary>
		<author><name>Gatestone</name></author>	</entry>

	</feed>