Using Burp to Test for the OWASP Top Ten

Use the links below to discover how Burp can be used to find the vulnerabilties currently listed in the OWASP Top 10.

  1. Injection
  2. Broken Authentication and Session Management
  3. Cross-Site Scripting (XSS)
  4. Insecure Direct Object References
  5. Security Misconfiguration
  6. Sensitive Data Exposure
  7. Missing Function Level Access Control
  8. Cross-Site Request Forgery (CSRF)
  9. Using Burp to Test for Components with Known Vulnerabilities
  10. Unvalidated Redirects and Forwards