Dynamic application security testing: Difference between revisions

Content deleted Content added
NEUrOO (talk | contribs)
No edit summary
NEUrOO (talk | contribs)
Line 11:
* Even for technical flaws, if the application doesn't give enough clue, the tool cannot catch it
* The tool cannot implement all variants of type of attacks for all vulnerabilities, this would take too long time to launch every attacks
* The tools usually have a bad rate of false-positive but it's mainly due to the testing method itself
*
 
=== Strengths ===