Owasp Top 10
Owasp Top 10
IDOR
Directory or Path Traversal
Function Injection
Privilege Escalation
Horizontal and Vertical Privilege Escalation
A03: Injection
Os Command Injection
SQL Injection
Cross-Site Scripting (XSS)
Expression Language Injection
XML Injection
LDAP Injection
NoSQL Injection
SSTI
Security-by-Obscurity
Session Fixation
Unintended Functionality
Use of Hardcoded Credentials
Weak Error Handling
1
A05: Security Misconfiguration
Brute-Force Attacks
Credential Stuffing
Credential Theft
Session Hijacking
Weak Password Policies
Weak Session Cookies
Lack of Multi-Factor Authentication (MFA)
Insecure Session Management
Insecure Authentication Protocols
Insecure Password Storage
User Enumeration
2
A08: Software and Data Integrity Failures
Unauthenticated SSRF
Authenticated SSRF
3
WEB APPLICATION PENTESTING CHECKLIST
OWASP Based Checklist
INFORMATION GATHERING
4
6. Looking For Metafiles
☐ View the Robots.txt file
☐ View the Sitemap.xml file
☐ View the Humans.txt file
☐ View the Security.txt file
6
18. Test File Permission
☐ Ensure the permissions for sensitive files
☐ Test for directory enumeration
7
23. Testing For Account Enumeration
☐ Check the response when a valid username and password entered
☐ Check the response when a valid username and an invalid password entered
☐ Check the response when an invalid username and password entered
☐ Ensure the rate-limiting functionality is enabled in username and password fields
AUTHENTICATION TESTING
8
27. Test For Weak Lockout Mechanism
☐ Ensure the account has been locked after 3-5 incorrect attempts
☐ Ensure the system accepts only the valid CAPTCHA
☐ Ensure the system rejects the invalid CAPTCHA
☐ Ensure CAPTCHA code regenerated after reloaded
☐ Ensure CAPTCHA reloads after entering the wrong code
☐ Ensure the user has a recovery option for a lockout account
9
31. Test For Weak Password Policy
☐ Ensure the password policy is set to strong
☐ Check for password reusability
☐ Check the user is prevented to use his username as a password
☐ Check for the usage of common weak passwords
☐ Check the minimum password length to be set
☐ Check the maximum password length to be set
10
35. Test For Weak Password Change Function
☐ Check if the old password asked to make a change
☐ Check for the uniqueness of the forgotten password
☐ Check for blank password change
☐ Check for password change function with HTTP
☐ Ensure the old password is not displayed after changed
☐ Ensure the other sessions got destroyed after the password change
AUTHORIZATION TESTING
11
39. Testing Travesal With Different OS Schemes
☐ Test Traversal with Unix schemes
☐ Test Traversal with Windows schemes
☐ Test Traversal with Mac schemes
12
SESSION MANAGEMENT TESTING
13
48. Test For Cross Site Request Forgery
☐ Check if the token is validated on the server-side or not
☐ Check if the token is validated for full or partial length
☐ Check by comparing the CSRF tokens for multiple dummy accounts
☐ Check CSRF by interchanging POST with GET method
☐ Check CSRF by removing the CSRF token parameter
☐ Check CSRF by removing the CSRF token and using a blank parameter
☐ Check CSRF by using unused tokens
☐ Check CSRF by replacing the CSRF token with its own values
☐ Check CSRF by changing the content type to form-multipart
☐ Check CSRF by changing or deleting some characters of the CSRF token
☐ Check CSRF by changing the referrer to Referrer
☐ Check CSRF by changing the host values
☐ Check CSRF alongside clickjacking
14
INPUT VALIDATION TESTING
15
56. Test For SQL Injection
☐ Test SQL Injection on authentication forms
☐ Test SQL Injection on the search bar
☐ Test SQL Injection on editable characteristics
☐ Try to find SQL keywords or entry point detections
☐ Try to inject SQL queries
☐ Use tools like SQLmap or Hackbar
☐ Use Google dorks to find the SQL keywords
☐ Try GET based SQL Injection
☐ Try POST based SQL Injection
☐ Try COOKIE based SQL Injection
☐ Try HEADER based SQL Injection
16
61. Test For Remote File Inclusion
☐ Look for RFI keywords
☐ Try to change the remote path
☐ Use RFI payload list
17
66. Test For Server Side Reqest Forgery
☐ Look for SSRF keywords
☐ Search for SSRF keywords only under the request header and body
☐ Identify the Injection points
☐ Test if the Injection points are exploitable
☐ Assess the injection impact
18
WEAK CRYPTOGRAPHY TESTING
20
OTHER COMMON ISSUES
21
81. Test For Weak 2FA
☐ Try to bypass 2FA by using poor session management
☐ Try to bypass 2FA via the OAuth mechanism
☐ Try to bypass 2FA via brute-forcing
☐ Try to bypass 2FA via response manipulation
☐ Try to bypass 2FA by using activation links to login
☐ Try to bypass 2FA by using status code manipulation
☐ Try to bypass 2FA by changing the email or password
☐ Try to bypass 2FA by using a null or empty entry
☐ Try to bypass 2FA by changing the boolean into false
☐ Try to bypass 2FA by removing the 2FA parameter on the request
" It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it."
— Stephane Nappo
Secure Your Business with Byte Capsule – International Award Winner & ISO 27001 Accredited
Cybersecurity Startup.
22