Link Details

Link 1056331 thumbnail
User 419398 avatar

By moolsan
Submitted: Oct 28 2013 / 03:58

The article shows the usage of the OWASP Zed Attack Proxy, a tool for easy penetration testing of web applications to find the most common vulneranilities. Furthermore it is shown how the proxy can be combined with automated acceptance testing and integrated into your continuous delivery pipeline.
  • 3
  • 0
  • 288
  • 65

Add your comment

Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (3)

Voters Against This Link (0)

    Play Framework
    Written by: Ryan Knight
    Featured Refcardz: Top Refcardz:
    1. Akka
    2. Design Patterns
    3. OO JS
    4. Cont. Delivery
    5. HTML5 Mobile
    1. Akka
    2. JUnit/EasyMock
    3. Java Performance
    4. REST
    5. Java