This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Joomla Vulnerability Scanner Project - Roadmap"
D0ubl3 h3lix (talk | contribs) |
D0ubl3 h3lix (talk | contribs) |
||
Line 7: | Line 7: | ||
To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc. | To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc. | ||
+ | == OWASP Joomla Vulnerability Scanner RoadMap == | ||
− | == | + | == Current Features == |
− | The | + | The following features are currently available. |
+ | * Searching known vulnerabilities of Joomla! & its components | ||
+ | * Reporting to Text & HTML output | ||
+ | * Immediate update capability via scanner or svn | ||
− | == | + | == Future Features == |
The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release: | The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release: | ||
+ | :# Write to files of "Request-Response" for found vulnerable things | ||
+ | :# Add MD5 cracker for found md5 hashes | ||
− | + | == Changes Under Consideration == | |
− | |||
− | |||
− | |||
− | == | ||
− | |||
− | + | *Implement features suggested by users |
Revision as of 18:10, 16 June 2009
About OWASP Joomla Vulnerability Scanner
Joomla! is probably the most widely-used CMS out there due to its flexibility, user-friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.
It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. No web security scanner is dedicated only one CMS.
To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc.
OWASP Joomla Vulnerability Scanner RoadMap
Current Features
The following features are currently available.
- Searching known vulnerabilities of Joomla! & its components
- Reporting to Text & HTML output
- Immediate update capability via scanner or svn
Future Features
The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release:
- Write to files of "Request-Response" for found vulnerable things
- Add MD5 cracker for found md5 hashes
Changes Under Consideration
- Implement features suggested by users
This category currently contains no pages or media.