Audit techniques and tools
Web security audits - Methodologies, tools and experience return
Article REF: H5135 V1
Audit techniques and tools
Web security audits - Methodologies, tools and experience return

Author : Laurent BUTTI

Publication date: April 10, 2014 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

3. Audit techniques and tools

We will not be presenting the tools already described in the article "Safety audits: methodologies, tools and feedback". We therefore invite the reader to refer to them. Indeed, the principles remain the same: information gathering, social engineering, discovery of application entry points...

In this chapter, we present the most commonly used tools for finding and exploiting security flaws in Web applications. We'll be focusing on the tools themselves, since they implement techniques that are commonly used manually by auditors.

Finally, we'll take a closer look at some of the tools commonly used in Web security audits.

3.1 Web vulnerability scanning

Web application auditing can be carried out by :

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Audit techniques and tools

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details