Penetration Testing Checklist
Penetration Testing Checklist
Penetration Testing Checklist
3) Spam Email Filters – Verify if incoming and outgoing email traffic is filtered
and unsolicited emails are blocked. Many email clients come with built-in
spam filters, which need to be configured per your needs. These configuration
rules can be applied on email headers, subjects or bodies.
5) Exploits – Try to exploit all servers, desktop systems, printers and network
devices.
6) Verification – Verify that all usernames and passwords are encrypted and
transferred over secured connections like HTTPs.
13) HTTP Methods – Review HTTP methods. PUT and Delete methods should
not be enabled on web server.
16) Application Login Pages – Application logins pages should be locked upon
few unsuccessful login attempts.
17) Error Messages – Error messages should be generic and not mention
specific error details like “Invalid username” or “Invalid password”.
19) Special Characters – Verify if special characters, HTML tags and scripts
are handled properly as an input value.
20) Internal System Details – Internal system details should not be revealed
in any of the error or alert messages.
22) Registry Entries – Review the use of registry entries. Sensitive information
should not be kept in registry.
23) Scanning Files – All files must be scanned before uploading to server.
24) Sensitive Data – Sensitive data should not be passed in URL’s while
communicating with different internal modules of the web application.
26) Input Fields – Check all input fields with long input strings – with and
without spaces.
33) Access Permissions – All access logs should be maintained with proper
access permissions.
34) Ending Sessions – Check that user sessions end upon log off.
36) Up-to-Date Versions – Verify that all applications and database versions
are up to date.
40) Brute Force Attacks – Check if systems are safe from Brute Force Attacks
– use a trial and error method to find sensitive information like passwords.
41) DoS – Ensure the system or network is secured from DoS (denial-of-
service) attacks. Attackers can target networks or a single computer with
continuous requests. Resources on target systems get overloaded, resulting in
denial of service for legit requests.