Web Application Penetration Test Checklist | Part – 02

In this article I am going to share a checklist which you can use when you are doing a penetration test on a website, you can also use this list as a reference in bug bounties. This list is made for intermediates, so they can look it for reference.

Be…

In this article I am going to share a checklist which you can use when you are doing a penetration test on a website, you can also use this list as a reference in bug bounties. This list is made for intermediates, so they can look it for reference.

Before starting this list I want to make a request that this is my advice that you should complete the previous checklist, so in this process you will not get confused.

You are not genius!! Remember this thing, so if you don’t understand something just Google about it and so some research, I also don’t know everything and there could be things that I have missed, so don’t worry and keep learning.



? The list

  1. Test for credentials transported over encryption.
    • When you submit your login/registration data try intercepting the request and changing the requests method. POST to GET, and GET to POST. If any points of time you find the data submitted by user are transported without encryption you can make this as low-level bug.
  2. Test for default credentials on admin page/console or any sign in panel.
    • Try submitting default username passwords like admin:admin, admin:password
  3. Bypassing the authentication.
  4. Check for broken access control.
  5. Remember password checking.
    • Check that is password being stored in the cookies or being constantly transferred in every request of the website. The credentials should only be sent I login phase.
  6. Check for directory traversal includes file input.
    • You have to check each and every input which your website and its directories take from user.
    • You can referrer to this article.
  7. Checking for privilege escalation.
    • You can check for this at some places like if user can make payment, adding something, sending message to someone.
    • You can intercept request of two different sets of account and try modifying parameters like grp, id, and role if they exist.
    • You can referrer to this article.
  8. Check for IDOR (Insecure Direct Object Reference).
    • You can try for getting access to other user data by changing parameters in URL.
  9. Check for bypassing session management object.
    • Set-cookies are secure or not?
    • Are cookies transmitted in encrypted manner?
    • Make sure cookies are not same every time when your browse website.
    • Sometimes website can leak their token structure/information try to find it.
    • Session ID predictability.
    • Brute forcing session ID.
  10. Check for CSRF.
  11. Check for XSS (stored, reflected, blind).
  12. Check for SQL injection (blind, In band, Out band, Error based etc.).
  13. Check for XML injection.
  14. Check for file upload.
  15. Check for open redirection or client-side open redirection.
    • You can referrer to this article.
  16. Checking for web sockets vulnerabilities.
  17. Check for code execution.
    • You can referrer to this article.
  18. Check for SSRF (Server Side Request Forgery).
  19. Check fir command injection.
    • You can referrer to this article.
  20. Checking for business logic flaws.
    • You can referrer to this article.
  21. Checking for LDAP injection.
    • You can referrer to this article.
  22. Check for HTTP request smuggling.

So this was all about some more things to check while doing penetration test on a website or in a bug bounty program. Hope you liked it and learned something new from it.

If you have any doubt, question, quires related to this topic or just want to share something with me, than please feel free to contact me.



? My personal blog

The Hacked Site



? Contact Me

Twitter,
LinkedIn,
Telegram,
Instagram,



? Write a mail

rahulmishra102000@gmail.com



? Other links

GitHub,
HackerRank,
Tryhackme


Print Share Comment Cite Upload Translate
APA
Rahul Mishra | Sciencx (2024-03-29T02:20:10+00:00) » Web Application Penetration Test Checklist | Part – 02. Retrieved from https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/.
MLA
" » Web Application Penetration Test Checklist | Part – 02." Rahul Mishra | Sciencx - Sunday April 11, 2021, https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/
HARVARD
Rahul Mishra | Sciencx Sunday April 11, 2021 » Web Application Penetration Test Checklist | Part – 02., viewed 2024-03-29T02:20:10+00:00,<https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/>
VANCOUVER
Rahul Mishra | Sciencx - » Web Application Penetration Test Checklist | Part – 02. [Internet]. [Accessed 2024-03-29T02:20:10+00:00]. Available from: https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/
CHICAGO
" » Web Application Penetration Test Checklist | Part – 02." Rahul Mishra | Sciencx - Accessed 2024-03-29T02:20:10+00:00. https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/
IEEE
" » Web Application Penetration Test Checklist | Part – 02." Rahul Mishra | Sciencx [Online]. Available: https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/. [Accessed: 2024-03-29T02:20:10+00:00]
rf:citation
» Web Application Penetration Test Checklist | Part – 02 | Rahul Mishra | Sciencx | https://www.scien.cx/2021/04/11/web-application-penetration-test-checklist-part-02/ | 2024-03-29T02:20:10+00:00
https://github.com/addpipe/simple-recorderjs-demo