Category Sub-Category Status: Pre-Scan Analysis
Category Sub-Category Status: Pre-Scan Analysis
Category Sub-Category Status: Pre-Scan Analysis
Pre-Scan
Analysis
Test if target is stable
Understand target
OS/Server/Framework/Technology/etc.
Scan
IBM AppScan
BurpSuite Pro
OWASP ZAP
Scan Report
Analysis
Scan Report Analysis
WebApp -
Information
Gathering
Search Engine discovery
Web-Frameworks Vulnerabilities
WebApp –
Authentication
Default Credentials
Account enumeration
Username/Password policy
Session ID analysis/predict/manipulation
Cookie Attribute
Session Fixation
Exposed Session Variables
Java Web Token (JWT) Exploitation
Java Serialization Attack
WebApp - Input
Validation
Reflected Cross Site Scripting
Parameter Pollution
LDAP Injection
XML Injection
XPath Injection
File Upload
HTTP Splitting/Smuggling
Stack Trace
SSL/TLS Issues
Padding Oracle
Client-side storage
Sensitive info management over client-side and
transport layer
WebApp -
Business Logic
Bypass
Workflow bypass
WebApp -
Client-side
Vulnerabilities
DOM XSS
Client-side URL redirection
Bypass client-side validation
Cross Site Flashing
Click-jack
Sensitive info in local storage
Web-socket testing
CORS exploitation
Browser cache
Content Security Policy
X-XSS-Protection
Reflected File Download
Comments / Observations** Tools to Use
JS Libraries - jQuery 2.1.1, jQuery 1.10.4, Data Tables, Selet 2, Wappalyzer, WhatRuns plugin for firefox
FancyBox 3.57 and chrome
UI- Bootstrap 4.3.1
Programing Languages - Groovy
Secure
nil
nil
nil
GET, POST
Present
Nil Burp
NIL
NA
NIL
NIL
Appscan /Burp
PadBuster - https://github.com/GDSSecurity/PadBusterhttp:/
Burp
Burp
for flash only, Appscan failed .
Conditions References
https://en.wikipedia.org/wiki/List_of_HTTP_header_fieldshttps://www.w3.org/Protocols/rfc2616/
http://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html
Check whether the current
password works or not after
initiating the forgot password
action. If just by providing the
email address or username
(i.e without any secret) in
forgot password feature if the
old password becomes
unusable then this flaw can be
used to perform a DoS attack.
Sometimes there is
authentication status value
(e.g. loggedin=false) sent in
the request / response.
Manipulating them may result
in completing successful
authentication with incorrect
userid/ password.
<html>
<head>
</head>
<body>
Tab nabbing validator
<script language="javascript">
window.opener.location = 'https://demo.testfire.net'
</script>
</body>
</html>
https://www.owasp.org/index.php/Testing_for_Error_Code_(OTG-ERR-001)
Install the latest testssl script of version from GitHub
https://github.com/drwetter/testssl.sh.git
Based on functional
walkthrough, identify critical
areas and test
Page 52
SQL-vectors
" or ""-"
" or "" "
" or ""&"
" or ""^"
" or ""*"
or true--
" or true--
' or true--
") or true--
') or true--
' or 'x'='x
') or ('x')=('x
')) or (('x'))=(('x
" or "x"="x
") or ("x")=("x
")) or (("x"))=(("x
Page 53