Solved

I need to use OWASP top 10 functionality in my application in full fleged , can anybody guide me for that

Posted on 2013-01-03
6
415 Views
Last Modified: 2014-10-07
i am implementing OWASP top 10 in my application, would be highly appreciable to give proper guideline to implement it.
0
Comment
Question by:vkvinjava32
  • 2
  • 2
6 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 334 total points
ID: 38742289
0
 
LVL 61

Assisted Solution

by:btan
btan earned 166 total points
ID: 38742583
OWASP cheatsheet is a good and quick glimpse on what you need but importantly decide on the programming language and explore the ESAPI which has a wide list of support for that. If you into .NET, suggest you catch this eBook

http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html

This is another quick view of overall that I liked espe for sharing with other developer (single page for each vulnerability). Note also the reference that has further more links to tap on for testing as well

https://www.owasp.org/images/0/0f/OWASP_T10_-_2010_rc1.pdf

Coming back it is not just coding, testing is critical be it Static code and Dynamic test. Like this as quick check where you are in stages of testing.

http://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/

Of course the various scanner is available out there which I recommend you see this blog
 
http://sectooladdict.blogspot.sg/2012/07/2012-web-application-scanner-benchmark.html
0
 
LVL 51

Assisted Solution

by:ahoffmann
ahoffmann earned 334 total points
ID: 38743720
> http://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/
please don't read
  *OWASP Top 10 Tools* and tactics
but
  *OWASP Top 10*: (some) tools and tactics

these tools a just for beginners to get an idea what web application security is about; depending on the goal to achieve there're more and better tools (not meaning that the listed tools are insufficient, and no offence meant)
another incomplete list
https://www.owasp.org/index.php/Phoenix/Tools

anyway, thanks for the link
0
 
LVL 61

Expert Comment

by:btan
ID: 38743743
No problem, going basic and appreciate the sharing ;) good list
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now