Je hebt een klacht over de onderstaande posting:
Ik ben aan de slag gegaan met het lezen en verwerken van informatie over OWASP. Hierbij vraag ik mij af of iemand mij kan uitleggen welke applicaties er zijn en hoe dit praktisch toegepast kan worden voor pentesters. Hier is de info van de originele documentatie/site: The first set of factors are related to the threat agent involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent. Skill level How technically skilled is this group of threat agents? No technical skills (1), some technical skills (3), advanced computer user (5), network and programming skills (6), security penetration skills (9), Motive How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9) Opportunity What resources and opportunities are required for this group of threat agents to find and exploit this vulnerability? Full access or expensive resources ...
Beschrijf je klacht (Optioneel):