Fork me on GitHub

Test and Verification -> Dynamic depth for applications: Coverage of client side dynamic components

Risk and Opportunity

Risk: Parts of the service are not covered during the scan, because JavaScript is not getting executed. Therefore, the co
Opportunity: Usage of a spider which executes dynamic content like JavaScript, e.g. via Selenium.

Exploit details

Usefullness: High
Required knowledge: Medium (two disciplines)
Required time: Medium
Required resources (systems): Very Low

Additional Information

Dependencies: Usage of different roles
Implementation hints: Ajax Spider
OWASP SAMM 1 Mapping: ST-2
OWASP SAMM 2 Mapping: v-security-testing|A|2