Web Application Penetration Testing Checklist
Web Application Penetration Testing Checklist
APPLICATION
PENETRATION TESTING
CHECKLIST
Reconnaissance Phase
Test Name Test Case Result
Identify Web Server, Technologies, Verify that the website is hosted on an HTTP server, front-end technologies,
and Database and back-end with PostgreSQL database.
ASN (Autonomous System Ensure the enumeration tool’s accuracy in obtaining ASNs,
Number) & IP Space Enumeration identifying IP addresses within a specified range, and detecting open ports and
and Service Enumeration services on a target IP address.
Ensure that the Google Dorking technique effectively retrieves sensitive
Google Dorking
information from public internet search engine results.
Subdomain Enumeration and Confirm that the subdomain enumeration and brute-forcing
Bruteforcing functionality accurately discover subdomains associated with the
target domain
Verify that the port scanning tool correctly identifies open ports on a target
Port Scanning IP address or network.
www.infosectrain.com
Registration Feature Testing
Duplicate Registration/Overwrite Verify that the registration process prevents duplicate registration
Existing User and overwriting of existing user accounts.
Insufficient Email Verification Process Verify that the email verification process adequately verifies
user email addresses.
Weak Registration Implementation - Confirm that the registration process does not allow registration with
Allows Disposable Email Addresses disposable email addresses.
Weak Registration Implementation- Verify that the registration process is securely implemented and does
Over HTTP not allow registration over an unencrypted HTTP connection.
Confirm that the registration process does not allow specially crafted
Overwrite Default Web Application Pages usernames that could potentially overwrite or manipulate default
web application pages.
www.infosectrain.com
Session Management Testing
Decode Cookies Using Standard Verify that cookies can be successfully decoded using standard
Decoding Algorithms decoding algorithms.
Modify Cookie:Session Token Value Verify if the application correctly handles slight modifications to
session cookie token values.
Test Self-Registration with Similar Check if the application handles self-registration with usernames
Usernames containing small variations.
Identify Cookie Domain Scope Ensure that session cookies are scoped to the appropriate domain.
Check for HttpOnly Flag in Cookie Confirm that session cookies are marked with the HttpOnly flag.
Ensure that session cookies are marked with the Secure flag if the
Check for Secure Flag in Cookie application is served over SSL.
www.infosectrain.com
Authentication Testing
Username Enumeration Verify that the system does not allow username enumeration.
Bypass Authentication using Test for bypassing authentication using various SQL injections on the
SQL Injections username and password fields.
SSL Transmission of User Credentials Confirm that user credentials are transmitted over SSL.
www.infosectrain.com
Post Login Testing
Enumerate Features Specific to a User Create a list of features specific to a user account and test for
Account and Conduct CSRF Testing Cross-Site Request Forgery (CSRF) vulnerabilities.
Change Email and Confirm Server-Side Ensure if changing the email address is validated on the server side
Validation and whether the application sends email confirmation links to
new users.
Verify Account Deletion Option with Forgot Verify the account deletion option and confirm it via the
Password Feature forgot password feature.
Change Email, Account ID, and User ID Change the email, account ID, and user ID parameters and attempt
Parameters for Brute Force brute force attacks on other users’ passwords.
www.infosectrain.com
Forgot Password Testing
Test Name Test Case Result
Find User Account Identification Identify the user account identification parameter and attempt to tamper
Parameter and Attempt Tampering with it to change another user’s password.
Check for Weak Password Policy Examine if password reset enforces a strong password policy.
www.infosectrain.com
Open Redirection Testing
Test Common Injection Parameters Examine common injection parameters for potential vulnerabilities.
Test Single Slash and URL Encoding Ensure using a single slash and URL encoding in URL parameters.
Use “//” to Bypass HTTP Blacklisted Check if using “//” in parameters bypasses HTTP blacklisted keywords.
Keyword
Use Null Byte (%00) to Bypass Check if using a null byte (%00) in parameters bypasses
Blacklist Filter blacklist filters.
Use ° Symbol to Bypass Check if the “°” symbol in parameters bypasses security filters.
www.infosectrain.com
Host Header Injection
Supply an Arbitrary Host Header Check the application’s handling of arbitrary host headers.
Check for Flawed Validation Verify if the application has flawed validation for Host headers.
www.infosectrain.com
SQL Injection Testing
Entry Point Detection Identify vulnerable entry points for SQL injection.
Run the SQL Injection Scanner on All Check if the SQL injection scanner identifies and reports any
Requests SQL injection vulnerabilities.
Bypassing Web Application Firewall Ensure bypass techniques are effective against the WAF
(WAF) (Web Application Firewall).
Time Delays Verify the effectiveness of time delays for each database system.
Use ° Symbol to Bypass Check if the “°” symbol in parameters bypasses security filters.
www.infosectrain.com
Cross-Site Scripting Testing
Reflect Output Inside JavaScript Variable Check if the output is reflected inside a JavaScript variable and if an
alert payload can be used.
Upload JavaScript Using Image File Check if the JavaScript code is executed when the image is displayed.
www.infosectrain.com
CSRF Testing
Confirm whether the CSRF token validation rejects a GET request when
Validation of CSRF Token
the validation process depends on the request method.
Check if the CSRF token is not associated with the user’s session and
The CSRF Token Is Independent of
ensure it validate the CSRF token even after the
the User Session
user session has ended.
validate the CSRF token even after the Ensure that the application should validate the CSRF token when the
user session has ended. non-session cookie is included.
www.infosectrain.com
SSO Vulnerabilities
Craft SAML Request and Server Craft a SAML request with a token and analyze how the server
Interaction processes the crafted SAML request.
Inject XXE Payloads in SAML Response Check if the server processes the XXE payloads.
SSO for Takeover Assess the possibility of taking over the victim’s account.
www.infosectrain.com
XML Injection Testing
Change Content Type for XML Injection Verify if the server is vulnerable to XML Injection.
Blind XXE with Out-of-Band Interaction Identifies if the server is vulnerable to Blind XXE attacks.
Whitelisted Null Origin Value Check if the server whitelists null Origin values.
Cloud Instances Check if SSRF vulnerabilities can access cloud instance data.
www.infosectrain.com
File Upload Testing
Null Byte (%00) Bypass Check if null bytes can bypass upload restrictions.
Magic Byte Bypass Identify if magic byte manipulation can bypass upload checks.
Client-Side Validation Bypass Check if client-side validation can circumvent upload restrictions.
Blacklisted Extension Bypass Check if the application effectively enforces extension restrictions.
www.infosectrain.com
CAPTCHA Testing
Missing Captcha Field Integrity Checks Verify if the application performs integrity checks on the Captcha field
and rejects incomplete submissions.
HTTP Verb Manipulation Check if changing HTTP verbs impacts Captcha validation.
Server-Side Validation for CAPTCHA Check if the server performs proper Captcha validation independently.
OCR Image Recognition Check if OCR tools can successfully recognize Captcha content.
Absolute Path Retrieval Check if Captcha images are accessible via absolute paths.
www.infosectrain.com
JWT Token testing
Creating a Fresh Token Using the “none” Verify if the application accepts or rejects tokens signed with the
Algorithm “none” algorithm.
Changing the Signing Algorithm Check how the application responds to changes in the
of the Token signing algorithm.
Signing the Asymmetrically-Signed Token Check if the application allows signing transitions from asymmetric
to Symmetric Algorithm Match to symmetric algorithms.
www.infosectrain.com
Websockets Testing
WebSockets Man-in-the-Middle
Perform a Man-in-the-Middle attack on WebSocket communication.
(MITM) Attempts
Content Stealing in Websockets Check if access to sensitive data is transmitted via WebSocket.
www.infosectrain.com
GraphQL Vulnerabilities Testing
www.infosectrain.com
WordPress Common Vulnerabilities
XSPA in WordPress Identify if there are any exposed services or ports that may be
susceptible to XSPA.
Information Disclosure WordPress Enumerate usernames and confirm if the application reveals
Username valid usernames.
Denial of Service via load-styles.php Assess if the file can be abused to launch DoS attacks.
www.infosectrain.com
Denial of Service
Frame Flood (Using GIF with Huge Frame) Check for the application for potential “Frame Flood” vulnerabilities.
CPDoS (Cache Poisoned Denial Check if attackers can poison the application’s cache
of Service) to cause a DoS condition.
www.infosectrain.com
Security Headers Testing
X-XSS-Protection Header Testing Verify the existence and settings of the X-XSS-Protection header.
www.infosectrain.com
Role Authorization Testing
Access Control Testing Verify the application’s access control by attempting to access
high-privileged resources with normal user privileges.
Insecure Direct Object Reference Check for IDOR vulnerabilities by attempting to access objects and
(IDOR) Testing data outside of the authorized scope.
www.infosectrain.com
Blind OS Command Injection Testing
www.infosectrain.com
Broken Cryptography
www.infosectrain.com
Found this useful?
To Get More Insights Through our FREE
Course | Workshops | eBooks | White Paper
Checklists | Mock Tests
www.infosectrain.com