This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Testing for Captcha (OWASP-AT-012)"

From OWASP
Jump to: navigation, search
(Brief Summary)
(Brief Summary)
Line 6: Line 6:
 
CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used by many web applications to ensure that the response is not generated by a computer.  
 
CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used by many web applications to ensure that the response is not generated by a computer.  
 
<br>
 
<br>
 +
=== NOTE: CAPTCHA is considered to be an ineffective security mechanism - most current CAPTCHAs in these days can be cracked in a fully automated way
 +
 
== Usage ==
 
== Usage ==
 
<pre>
 
<pre>

Revision as of 23:48, 17 November 2013

This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project


Brief Summary


CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used by many web applications to ensure that the response is not generated by a computer.
=== NOTE: CAPTCHA is considered to be an ineffective security mechanism - most current CAPTCHAs in these days can be cracked in a fully automated way

Usage

{{note|Foo}}
{{note|Foo|reminder}}
{{note|Foo|error}}
{{note|Foo|gotcha}}
{{tip|Foo}}
{{note}} Loose test
{{tip}} Loose test

Template:Note Template:Note Template:Note Template:Note Template:Tip Template:Note Loose test

Template:Tip Loose test


Description of the Issue


...here: Short Description of the Issue: Topic and Explanation

Black Box testing and example

Testing for Topic X vulnerabilities:
...
Result Expected:
...

References

Whitepapers
...
Tools
...