abstract |
A computerized method, a computer-readable medium and a computerized test system are provided for analyzing target web-based applications, for example, to identify design characteristics of the application which render it susceptible to exploit. Hypertext links within the application are navigated to obtain a listing of associated web pages. Each web page may then be parsed to extract associated traffic data which matches any search items pertaining to sensitive data categories of interest. The extracted traffic data is stored within a storage location to identify a compilation of potentially exploitable design characteristics. |