All Projects → tprynn → Web Methodology

tprynn / Web Methodology

Licence: other
Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki

Projects that are alternatives of or similar to Web Methodology

Taipan
Web application vulnerability scanner
Stars: ✭ 359 (+152.82%)
Mutual labels:  web-application, application-security, security-testing
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-40.14%)
Mutual labels:  application-security, appsec
gha-setup-scancentral-client
GitHub Action to set up Fortify ScanCentral Client
Stars: ✭ 15 (-89.44%)
Mutual labels:  application-security, appsec
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+2366.9%)
Mutual labels:  appsec, application-security
Resources-for-Application-Security
Some good resources for getting started with application security
Stars: ✭ 97 (-31.69%)
Mutual labels:  application-security, appsec
nerdbug
Full Nuclei automation script with logic explanation.
Stars: ✭ 153 (+7.75%)
Mutual labels:  application-security, appsec
Application Security Engineer Interview Questions
Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
Stars: ✭ 267 (+88.03%)
Mutual labels:  appsec, application-security
Php Security Check List
PHP Security Check List [ EN ] 🌋 ☣️
Stars: ✭ 262 (+84.51%)
Mutual labels:  web-application, security-testing
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+4315.49%)
Mutual labels:  appsec, application-security
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+142.96%)
Mutual labels:  application-security, security-testing
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 7,533 (+5204.93%)
Mutual labels:  application-security, appsec
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-20.42%)
Mutual labels:  appsec, application-security
Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+2627.46%)
Mutual labels:  appsec, application-security
sqlinjection-training-app
A simple PHP application to learn SQL Injection detection and exploitation techniques.
Stars: ✭ 56 (-60.56%)
Mutual labels:  application-security, appsec
Rfi Lfi Payload List
🎯 RFI/LFI Payload List
Stars: ✭ 202 (+42.25%)
Mutual labels:  appsec, application-security
Cheatsheetseries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Stars: ✭ 19,302 (+13492.96%)
Mutual labels:  appsec, application-security
Command Injection Payload List
🎯 Command Injection Payload List
Stars: ✭ 658 (+363.38%)
Mutual labels:  application-security, security-testing
Securityrat
OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development
Stars: ✭ 115 (-19.01%)
Mutual labels:  appsec, application-security
Kanji Koohii
A web application to help Japanese language learners remember the kanji.
Stars: ✭ 137 (-3.52%)
Mutual labels:  web-application
Pep8 Ja
PEP8 日本語版
Stars: ✭ 138 (-2.82%)
Mutual labels:  documentation

Jump straight to the methodology, hosted in this repo's wiki.

Alternatively, check out the Google Sheets template for test tracking.

About the methodology

This methodology presents an opinionated guide on how to conduct a web application security assessment. The primary focus is on clearly enumerating all the main areas that a tester should cover during a security review. As a tool, security testers can learn from the document and use it to shape their testing process. It can also be used by developers to understand what types of vulnerabilities may exist in their applications and the best practices they should implement to reduce the risk of attacks.

Goals of the methodology

The goal of this methodology is to be as effective as possible in communicating what issues to test for, why that issue matters, and (where possible) provide recommendations on how to efficiently test for and remediate the issue. The guiding principles I follow when writing the document are:

Flexibility, Reliability, Usability: The document should be kept up-to-date and usable across a wide range of different applications. If the methodology focuses too heavily on specific technologies or frameworks, readers won't be sure whether a given issue applies to their situation. It should be usable by less-experienced readers (to provide an introduction to what modern security testing looks like) and highly-experienced readers (to keep them up-to-date and help ensure they achieve full coverage).

Be Succinct: The document should be as succinct as possible in explaining each category or issue. Get straight to the heart of the matter and provide high-quality references when needed for more information. Avoid bloating the document with information on any single issue, when one issue is only a small portion of the entire document.

Be Opinionated: Don't shy away from clearly stating best practices. Even more importantly, do not attempt to cover every possible security issue - especially when an issue has minimal or no impact in most situations. If an issue has a range of acceptable recommendations, make a secure, widely-applicable suggestion and rely on the reader to adjust the recommendation for their specific context.

Ultimately, no methodology is a substitute for the judgment of an experienced tester who can take into account the context of their specific application. A home-grown embedded HTTP server written in C will have very different vulnerabilities than a Kubernetes microservice using the latest web framework with a React frontend. This document defines a baseline which can be used by anyone interested in improving the security of web applications, and serves as a standard which testers can hold themselves to in order to deliver high-quality results.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].