3. Audit techniques and tools
We will not be presenting the tools already described in the article "Safety audits: methodologies, tools and feedback". We therefore invite the reader to refer to them. Indeed, the principles remain the same: information gathering, social engineering, discovery of application entry points...
In this chapter, we present the most commonly used tools for finding and exploiting security flaws in Web applications. We'll be focusing on the tools themselves, since they implement techniques that are commonly used manually by auditors.
Finally, we'll take a closer look at some of the tools commonly used in Web security audits.
3.1 Web vulnerability scanning
Web application auditing can be carried out by :
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Audit techniques and tools
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Works
- SHEWHART (S.), WALTER (A.) - Economic control of quality of manufactured product/50 th anniversary commemorative issue. - American Society for Quality December 1980. ISBN 0-87389-076-0. OCLC 223422287 (1930).
Also in our database
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!