WebApp Sec mailing list archives

Pentest of BPM Product


From: Anant Iyer <iyer.anant.r () gmail com>
Date: Thu, 8 Apr 2010 11:35:40 +0530

Hello,

Does anybody have experience in carrying out an application pentest of
any BPM products like Pega? If so, then can anybody please let me know
what are the basic points to keep in mind while carrying out pentest
of such products?

On an additional note, are there any legal issues in carrying out a
pentest of a product application which is deployed at a client’s
organization?

Regards,

Anantharaman Iyer



This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: