This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Projects/OWASP OWTF/Roadmap"

From OWASP
Jump to: navigation, search
(Created page with "The roadmap is to improve security testing efficiency by gradually integrate the best tools to unite them and make them work together with the security tester instead of havin...")
 
 
Line 1: Line 1:
The roadmap is to improve security testing efficiency by gradually integrate the best tools to unite them and make them work together with the security tester instead of having the security tester babysit them.
+
= Road Map and Getting Involved =
 
+
OWTF attempts to solve the "penetration testers are never given enough time to test properly" problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:
OWTF also aims to be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.
+
* To improve security testing efficiency (i.e. test more in less time)
 +
* To improve security testing coverage (i.e. test more)
 +
* Gradually integrate the best tools
 +
* Unite the best tools and make them work together with the security tester
 +
* Remove or Reduce the need to babysit security tools during security assessments
 +
* Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.

Latest revision as of 18:38, 6 October 2014

Road Map and Getting Involved

OWTF attempts to solve the "penetration testers are never given enough time to test properly" problem, or in other words, OWTF = Test/Exploit ASAP, with this in mind, as of right now, the priorities are:

  • To improve security testing efficiency (i.e. test more in less time)
  • To improve security testing coverage (i.e. test more)
  • Gradually integrate the best tools
  • Unite the best tools and make them work together with the security tester
  • Remove or Reduce the need to babysit security tools during security assessments
  • Be a respository of PoC resource links to assist exploitation of vulnerabilities in order to illustrate risk to businesses.