Our 19 attacks, described in an abridged format in this whitepaper, are practical, effective and based on years of research into software security defects. These attacks are effective on any kind of application, platform and development language. They are also the cornerstone of Security Innovation's methodology that subsumes all other security standards, including the OWASP top ten, and we pass them along to you for use in your security testing efforts.
Areas covered incorporate:
- Attacking Software Dependencies
- Breaking Security through the User Interface
- Attacking Design
- Attacking Implementation