This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of ".NET Penetration Testing"
(→Blogs, Articles & Projects) |
|||
Line 29: | Line 29: | ||
[http://blogs.microsoft.co.il/blogs/alikl/archive/2006/12/29/Wrong-Way-To-Do-Penetration-Testing.aspx Wrong Way to Do Penetration Testing] | [http://blogs.microsoft.co.il/blogs/alikl/archive/2006/12/29/Wrong-Way-To-Do-Penetration-Testing.aspx Wrong Way to Do Penetration Testing] | ||
− | |||
===Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)=== | ===Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)=== |
Revision as of 14:24, 30 June 2008
.NET Security Quick Reference |
---|
.NET Penetration Testing
Plan, Discover, Attack and Report - this section is for tools, checklists and references for penetration testing .NET web applications and services.
Areas of Concern
- Planning the hack
- Ethically hacking
- Attack Vectors
- Intelligence gathering
- Reporting
Blogs, Articles & Projects
OWASP .NET Vulnerability Research
MSDN Magazine: Security Briefs: Penetration Testing
Wrong Way to Do Penetration Testing
Online Media (Podcasts, Webcasts, Presentations, eBooks etc.)
MSDN Webcast: Penetration Testing with Visual Studio Team System and Fortify Security Tester
Penetration for Web Applications Part 1 (PDF)
Penetration for Web Applications Part 1 (PDF)
References
NIST 800-42 Guideline on Network Security Testing
ISECOM Open Source Security Testing Methodology Manual
OISSG Information Systems Security Assessment Framework (ISSAF)