The basic approaches to testing for vulnerability information and telecommunications and computer systems, the choice of direction made pen-test web resources. According to the methodology OWASP TOP 10 scenarios developed information collection, information analysis and testing site. Determined common mistakes and susceptibility. Based on statistics main dangers website developed methodology variant testing web application. It is concluded that further development in this direction should be conducted in a plane classification, analysis and management of individual levels of OWASP, expansion and consideration of possible cyber attacks on Web resources.
pen-testing, Web application, site, cyber-attacks, hacking hacks, Open Web Application Security Project
"Metodolohiia provedennia pen-testuvannia veb-dodatkiv" [Methodology of pen-testing web applications],
Information Processing Systems,