This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Testing Project Roadmap"
(4 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{taggedDocument | ||
+ | | type=partialOld | ||
+ | }} | ||
+ | {{taggedDocument | ||
+ | | type=delete | ||
+ | | comment=Tagged via fixme/delete. | ||
+ | }} | ||
The project's overall goal is to... | The project's overall goal is to... | ||
− | + | '''be a reference document for the purpose of performing penetration testing. This project shall provide examples of the most common web application vulnerabilities and attacks.''' | |
In the near term, we are focused on the following tactical goals... | In the near term, we are focused on the following tactical goals... | ||
− | + | 1. '''Looking at each attack type and examine the method of testing to verify if the vulnerability exists.''' | |
− | |||
− | |||
− | + | 2. '''Examining other technical and non technical methods to examing and find vulnerabilities in applications.''' | |
− | + | 3. '''Discussing the OWASP testing framework and how it can help one to cover all the based when performing a pen test or risk assessment.''' | |
+ | |||
+ | 4. '''The Live CD in conjunction with Packetfocus.com. This aims to be the paramount Live CD for application security testing, code review, learning, and saving the world!''' | ||
− | |||
[[Category:OWASP Testing Project]] | [[Category:OWASP Testing Project]] |
Latest revision as of 21:38, 30 July 2016
You can help OWASP by improving it or discussing it on its Talk page. See FixME
Comment: Tagged via fixme/delete.
The project's overall goal is to...
be a reference document for the purpose of performing penetration testing. This project shall provide examples of the most common web application vulnerabilities and attacks.
In the near term, we are focused on the following tactical goals...
1. Looking at each attack type and examine the method of testing to verify if the vulnerability exists.
2. Examining other technical and non technical methods to examing and find vulnerabilities in applications.
3. Discussing the OWASP testing framework and how it can help one to cover all the based when performing a pen test or risk assessment.
4. The Live CD in conjunction with Packetfocus.com. This aims to be the paramount Live CD for application security testing, code review, learning, and saving the world!