-10
  1. What knowledge is needed?
  2. What software is to be used?
  3. How are the reports written? PS: Websites like facebook.com
neOh
  • 1
  • 1
  • 2

1 Answers1

2
  1. General knowledge about how applications work and how to introduce atypical or unexpected behavior into the application that might pose a security threat. Please refer to the OWASP testing guide. https://www.owasp.org/index.php/OWASP_Testing_Project
  2. Depends, there are a lot of tools like Zap, Burp, BackTrack and of course homebrew scripts.
  3. That entirely depends on the tester, I've seen bad reports, I've seen good reports. Mostly you try to: describe the vulnerability, describe the risk and give a recommendation. You also rate the impact and probability such a vulnerability would actually be exploited.
Rory Alsop
  • 61,367
  • 12
  • 115
  • 320
Lucas Kauffman
  • 54,169
  • 17
  • 112
  • 196