This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Testing for Brute Force (OWASP-AT-004)"
(→Brief Summary) |
(→Brief Summary) |
||
Line 3: | Line 3: | ||
== Brief Summary == | == Brief Summary == | ||
<br> | <br> | ||
− | Brute-forcing consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. | + | Brute-forcing consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. In web application testing, the problem we are going to face with the most is very often connected with the need of having a valid user account to access the inner part of the application. |
− | |||
− | In web application testing, the problem we are going to face with the most is very | ||
− | |||
− | often connected with the need of having a valid user account to access the inner part of the application. | ||
Therefore we are going to check different types of authentication schema and the effectiveness of different bruteforcing attacks. | Therefore we are going to check different types of authentication schema and the effectiveness of different bruteforcing attacks. | ||
<br> | <br> |
Revision as of 10:16, 4 November 2006
OWASP Testing Guide v2 Table of Contents
Brief Summary
Brute-forcing consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement. In web application testing, the problem we are going to face with the most is very often connected with the need of having a valid user account to access the inner part of the application.
Therefore we are going to check different types of authentication schema and the effectiveness of different bruteforcing attacks.
Description of the Issue
...here: Short Description of the Issue: Topic and Explanation
Black Box testing and example
Testing for Topic X vulnerabilities:
...
Result Expected:
...
Gray Box testing and example
Testing for Topic X vulnerabilities:
...
Result Expected:
...
References
Whitepapers
...
Tools
...
OWASP Testing Guide v2
Here is the OWASP Testing Guide v2 Table of Contents OWASP Testing Guide v2 Table of Contents
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.