Web application security testing workflow for OWASP Top 10 vulnerabilities including injection, XSS, authentication flaws, and access control issues.
Specialized workflow for testing web applications against OWASP Top 10 vulnerabilities including injection attacks, XSS, broken authentication, and access control issues.
Use this workflow when:
scanning-tools - Security scanningtop-web-vulnerabilities - OWASP knowledgeUse @scanning-tools to perform web application reconnaissance
sql-injection-testing - SQL injectionsqlmap-database-pentesting - SQLMapUse @sql-injection-testing to test for SQL injection
Use @sqlmap-database-pentesting to automate SQL injection testing
xss-html-injection - XSS testinghtml-injection-testing - HTML injectionUse @xss-html-injection to test for cross-site scripting
broken-authentication - Authentication testingUse @broken-authentication to test authentication security
idor-testing - IDOR testingfile-path-traversal - Path traversalUse @idor-testing to test for insecure direct object references
Use @file-path-traversal to test for path traversal
api-security-best-practices - Security headersUse @api-security-best-practices to audit security headers
reporting-standards - Security reportingUse @reporting-standards to create security report
security-audit - Security auditingapi-security-testing - API securitywordpress-security - WordPress security