fuzz testing web applications

Learn about fuzz testing web applications, we have the largest and most updated fuzz testing web applications information on alibabacloud.com

How to do web-side compatibility testing

Environment of compatibility testing1, Compatibility testing: Refers to the test project on a specific software platform, the use of different applications, different operating systems in different network environment normal operation.2, the main types of Web Compatibility test: Common operating system has WINDOWS7, Windows XP and so on. Users use the type of ope

Ten free web stress testing tools

set on your site, so the configuration file and session information will be saved permanently. 3. fwptt-fwptt is also a tool used for Web application load testing. It can record normal requests or Ajax requests. It can be used to test Asp.net,JSP, PHP, or other web applications. 4. jcrawler-jcrawler is an open source

[Initial code] refresh the release of. NET Web applications using Web Deploy in Window Server 2016, 2016 deploy

exceptions, but if it still does not work, you need to manually add it. Okay. So far, the Web Deploy configuration has been completed,Be sure to restart the server Next, we also need to perform the test (next, do not go, it is very important to have one step of permission configuration in the test) 1. Create an IIS Site It is worth noting that the Local Service permission must be granted to the folder in the directory where the IIS site is l

Linux-based Web server performance testing

Article Title: Linux-based Web server performance testing. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source. Abstract: Linux, as a free open-source operating system, is receiving increasing attention. With the release date of th

Information collection for Web Security penetration testing (part 2) (1)

Bkjia.com exclusive Article] When we conduct a Security penetration test, the first thing we need to do is to collect as much information as possible for the target application. Therefore, information collection is an essential step for penetration testing. This task can be completed in different ways, By using search engines, scanners, simple HTTP requests, or specially crafted requests, applications may l

Some things about web-side functional Testing (i)

areas of the security test are the following:1) Now many Web applications are registered after the registration method, therefore, testing the effective invalid user name and password, attention to case sensitivity, the number of times limit, whether you can not login and browse some pages, etc.2) Whether there is a timeout limit3) test the user when the relevan

Using Docker to develop Python Web applications _docker

In this article, I'll try to show you how to develop Python applications (primarily Web applications) with Docker. While I am personally focused on Python's flask micro-framework, the purpose of this article is to demonstrate how to better develop and share applications (applicatio

Firefox plug-ins for web security testing

re-initiate requests after request parameters are modified Modify HeaderAnother plugin to modify the request header Cookies manager+View, modify cookies HackbarToolkit, you can easily control the modification URL, there are some encoding conversion, encryption tools, SQL, XSS tools WappalyzerCheck which Web applications a website uses such as blog engine, CMS, e-commerce program, Statistics tool, host Cont

Cross-Site Request Forgery (CSRF) in Web Security Testing (1)

Bkjia.com exclusive Article] Cross-Site Request Forgery (CSRF) is known as the "sleeping giant" among many vulnerabilities in the Web security field. Its threat level is also known as "reputation. This article briefly introduces this vulnerability and describes in detail the cause of this vulnerability, as well as the specific methods and examples for testing the black box and gray box vulnerabilities, fina

Developing Web applications with JSP 2.0

Developing Web applications with JSP 2.0 Author: Qusay H. MahmoudJuly 2003 The JSP (JavaServer Pages) technology is a further abstraction of the servlet, developed by JCP (Java Community Process), is an open, freely accessible specification for generating dynamic content, and is also Java 2 Enterprise Edition) is an important part of the specification. Many business application servers such as Bea WebLogic,

Developing Web applications with JSP 2.0

The js|web| program JSP (JavaServer Pages) technology is a further abstraction of the servlet, developed by the JCP (Java Community Process), an open, freely accessible specification for generating dynamic content, It is also an important part of the Java 2 Enterprise Edition specification. Many business application servers such as Bea WebLogic, IBM WebSphere, Live JRun, and Orion support JSP technology. JSP technology is applied everywhere on the

Web Application Full Test Guide _ Exploratory testing

With the development of web technology and mobile Internet, more and more applications are migrating to the cloud, which makes it possible for users to use them anytime and anywhere. At present, a large number of high-quality applications, and gradually improve the user's taste, but also reduce the user's tolerance, if your W

Overall web application testing

With the increasing popularity of the Internet, there are more and more large applications based on the B/S structure. It is becoming increasingly urgent to test these applications. Many testers wrote to me about how to perform the B/S test. Due to busy work, the question raised by me was a headache, there is no overall overview of the Web

Entering the Security Hall-read Web intrusion Security Testing and Countermeasures

Preface I recently read Web intrusion Security Testing and countermeasures, and have gained a lot of inspiration. This book introduces a lot of Web intrusion ideas and well-known security sites outside China, which has broadened my horizons. Here, I have summarized the attack modes mentioned in the book again, and attached some relevant references, hoping to help

Linux-based Web server performance testing

The importance of Linux based Web server performance testing Linux, as a free open source operating system, is becoming more and more important to people. With the advent of a stable Linux 2.4 kernel release date and the introduction of the Intel IA-64 architecture, Linux's share of the market for server operating systems continues to grow, and Linux based applications

Linux-based Web server performance testing

The importance of Linux based Web server performance testing Linux, as a free open source operating system, is becoming more and more important to people. With the advent of a stable Linux 2.4 kernel release date and the introduction of the Intel IA-64 architecture, Linux's share of the market for server operating systems continues to grow, and Linux based applications

Web Apps for XSS vulnerability testing

Transferred from: http://www.uml.org.cn/Test/201407161.aspXSS vulnerability testing of Web applications cannot be limited to entering XSS attack fields on Web pages and submitting them. Bypassing JavaScript detection, entering an XSS script, usually ignored by the tester. The attack path that bypasses JavaScript detect

Web penetration testing strategy [1]

bytes:10243 (10.0 KiB)Interrupt:11 Base address:0x8000 In this example, the IP address is 10.0.2.15. During the training, the host name of the affected machine is vulneralble. You can use an IP address to replace the host name, or you can add the host name and the corresponding IP address to the host file. In windows, the host file is located C: \ Windows \ System32 \ Drivers \ etc \ hosts In Unix/Linux and Mac OS X, the host file is located in /Etc/hosts T

Using Dojo to develop AJAX Web applications in WebSphere Smash

Before you start This article assumes that you have downloaded WebSphere SMash and completed a concise tutorial, or have written a simple application. You should be familiar with the fundamentals of Ajax and how Dojo is used. You will also need the following prerequisites to complete the sample application in this article: JDK 5.0 or later. WebSphere sMash 1.0.0.4 or later command-line environment. An unobstructed network connection to connect to an SMTP mail server. Firefox 3.0 for starti

How can we ensure the security of Web applications? (1)

easier to solve in the early stages of the life cycle. The cost will be extremely high if the application is put into production and then "final. Web Application Security Vulnerabilities can cause data leakage and violation policies. In addition, patching or comprehensive code repair after deployment will greatly increase the total cost. To ensure benefits and efficiency, the security of Web

Total Pages: 10 1 .... 5 6 7 8 9 10 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.