Difference between revisions of "Security - OWASP Top Ten testing"
(Created page with "The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application se...") |
Philip Lacey (talk | contribs) |
||
| (2 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| + | = Overview = | ||
| + | |||
| + | |||
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. | The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. | ||
| + | |||
| + | |||
| + | https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project | ||
| + | |||
It is urged for all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code. | It is urged for all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code. | ||
| − | At All n One we | + | |
| + | |||
| + | = Kali Linux = | ||
| + | |||
| + | |||
| + | https://www.kali.org/ | ||
| + | |||
| + | |||
| + | At All n One we utilise the Linux based penetration testing operating system KALI. Kali OS comes loaded with lots of different testing tools. | ||
| + | |||
| + | |||
| + | |||
| + | = OWASP ZAP = | ||
| + | |||
| + | |||
| + | https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project | ||
| + | |||
| + | |||
| + | All n One use OWASP ZAP to allow us to find these OWASP issues and then mitigate against them. This process is conducted Monthly. | ||
| + | |||
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. | The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. | ||
| − | |||
| − | Some of ZAP's functionality: | + | ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. |
| − | Intercepting Proxy | + | |
| − | Traditional and AJAX spiders | + | |
| − | Automated scanner | + | Some of ZAP's functionality: |
| − | Passive scanner | + | * Intercepting Proxy |
| − | Forced browsing | + | * Traditional and AJAX spiders |
| − | Fuzzer | + | * Automated scanner |
| − | Dynamic SSL certificates | + | * Passive scanner |
| − | Smartcard and Client Digital Certificates support | + | * Forced browsing |
| − | Web sockets support | + | * Fuzzer |
| − | Support for a wide range of scripting languages | + | * Dynamic SSL certificates |
| − | Plug-n-Hack support | + | * Smartcard and Client Digital Certificates support |
| − | Authentication and session support | + | * Web sockets support |
| − | Powerful REST based API | + | * Support for a wide range of scripting languages |
| − | Automatic updating option | + | * Plug-n-Hack support |
| − | Integrated and growing marketplace of add-ons | + | * Authentication and session support |
| − | + | * Powerful REST based API | |
| − | Some of ZAP's features: | + | * Automatic updating option |
| + | * Integrated and growing marketplace of add-ons | ||
| + | |||
| + | |||
| + | Some of ZAP's features: | ||
| + | * Open source | ||
| + | * Cross platform | ||
| + | * Easy to install (just requires Java 1.7) | ||
| + | * Completely free (no paid for 'Pro' version) | ||
| + | * Ease of use a priority | ||
| + | * Comprehensive help pages | ||
| + | * Fully internationalized | ||
| + | * Translated into a dozen languages | ||
| + | * Community based, with involvement actively encouraged | ||
| + | * Under active development by an international team of volunteers | ||
| + | |||
| − | + | [[Category:Topic:Security]] | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
Latest revision as of 13:26, 4 May 2015
1 Overview
The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
It is urged for all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.
2 Kali Linux
At All n One we utilise the Linux based penetration testing operating system KALI. Kali OS comes loaded with lots of different testing tools.
3 OWASP ZAP
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
All n One use OWASP ZAP to allow us to find these OWASP issues and then mitigate against them. This process is conducted Monthly.
The OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Some of ZAP's functionality:
- Intercepting Proxy
- Traditional and AJAX spiders
- Automated scanner
- Passive scanner
- Forced browsing
- Fuzzer
- Dynamic SSL certificates
- Smartcard and Client Digital Certificates support
- Web sockets support
- Support for a wide range of scripting languages
- Plug-n-Hack support
- Authentication and session support
- Powerful REST based API
- Automatic updating option
- Integrated and growing marketplace of add-ons
Some of ZAP's features:
- Open source
- Cross platform
- Easy to install (just requires Java 1.7)
- Completely free (no paid for 'Pro' version)
- Ease of use a priority
- Comprehensive help pages
- Fully internationalized
- Translated into a dozen languages
- Community based, with involvement actively encouraged
- Under active development by an international team of volunteers