This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of ".NET Penetration Testing"
From OWASP
Line 27: | Line 27: | ||
[http://www.owasp.org/index.php/Rooting_The_CLR Rooting the CLR (Draft)] | [http://www.owasp.org/index.php/Rooting_The_CLR Rooting the CLR (Draft)] | ||
− | [http://csrc.nist.gov/publications/nistpubs/800-42/NIST-SP800-42.pdf Guideline on Network Security Testing] | + | [http://csrc.nist.gov/publications/nistpubs/800-42/NIST-SP800-42.pdf NIST 800-42 Guideline on Network Security Testing] |
===Tools=== | ===Tools=== | ||
[http://www.owasp.org/index.php/Source_Code_Audit_Tools Source Code Audit Tools] | [http://www.owasp.org/index.php/Source_Code_Audit_Tools Source Code Audit Tools] |
Revision as of 01:14, 16 April 2008
.NET Security Quick Reference |
---|
.NET Penetration Testing
Plan, Discover, Attack and Report - this section is for tools, checklists and references for penetration testing .NET web applications and services.
Areas of Concern
- Planning the hack
- Ethically hacking
- Attack Vectors
- Intelligence gathering
- Reporting
Articles
References
NIST 800-42 Guideline on Network Security Testing