Link Details

Link 1056331 thumbnail
User 419398 avatar

By moolsan
via blog.codecentric.de
Submitted: Oct 28 2013 / 03:58

The article shows the usage of the OWASP Zed Attack Proxy, a tool for easy penetration testing of web applications to find the most common vulneranilities. Furthermore it is shown how the proxy can be combined with automated acceptance testing and integrated into your continuous delivery pipeline.
  • 3
  • 0
  • 271
  • 65

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (3)



Voters Against This Link (0)



    Debugging JavaScript
    Written by: Ashutosh Sharma
    Featured Refcardz: Top Refcardz:
    1. Design Patterns
    2. OO JS
    3. Cont. Delivery
    4. Java EE7
    5. HTML5 Mobile
    1. Java EE7
    2. Spring Annotations
    3. Git
    4. Java
    5. REST