• Register

Web Application Analysis refers to all applications that are accessed through a browser. Security testing for your application is very important if data leaks or modifications are unacceptable and intolerable. For example, if a e-commerce applications, which sometimes involve banking transactions, security testing is critical. It should also ensure that sufficient authentication and authorization mechanisms are in place.

Security testing can be static or dynamic.

  • Static testing involves doing a static code analysis to check for any vulnerabilities. The goal is to understand the code flow and check for security threats by walking through the code.
  • Dynamic testing entails running the application to see if the response is as expected for the associated request. It is very similar to black box testing.


WEB APPLICATION ANALYSIS - SOFTWARE'S / TOOLS / UTILITIES

  1. Web Proxies
  2. Web Scanners
  3. Web Testing Frameworks
  4. Web Browser Assessment
  5. Web Browser For Penetration Testing
  6. Fuzzers
  7. Database Assessment


WEB PROXIES


   
WEB SCANNERS


  
WEB TESTING FRAMEWORKS

  • Bizploit
  • Sahi
  • Websecurify
  • Mutillidae
  • BeFF
  • zaproxy
  • FunkLoad



WEB BROWSER ASSESSMENT

  • Beef
  • Browser Fuzzer 3 (bf3)
  • Browser Rider



WEB BROWSER FOR PENETRATION TESTING

  • OWASP Mantra
  • Sandcat Browser
  • Hcon
  • twill


 
FUZZERS

  • FuzzDb
  • OWASP ZAP
  • PowerFuzzer
  • Wfuzz
  • DotDotPwn   


 
DATABASE ASSESSMENT

  • MS-SQL
  • DBPwAudit
  • Metacoretex
  • Mssqlfp
  • MSSQLScan
  • Pblind
  • SA Exploiter
  • SQLbrute
  • SQLiX
  • SQLMap
  • SQL Ninja
  • MYSQL
  • DBPwAudit
  • Metacoretex
  • MYSQLAudit
  • MySploit
  • Pblind
  • SQLCheck
  • SQLData
  • SQLiX
  • SQLMap
  • Sqlsus
  • UDF
  • MYSQL 5 ENUMERATOR
  • ORACLE
  • DBPwAudit
  • Metacoretex
  • Opquery
  • Opwg
  • Oscanner
  • Ose
  • Otnsctl
  • Pblind
  • SQLbrute
  • SQLiX
  • SQLMap
  • Encryption Wizard



SQL INJECTION FRAMEWORKS

  • BSQL Hacker
  • Sqlninja
  • Havij
  • Pangolin
  • The Mole
  • Safe3SI
  • Darkjumper
  • GreenSQL
  • xpath blind explorer

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.