Skip to content

Instantly share code, notes, and snippets.

@AlexeySolovyev
Forked from jhaddix/Testing_Checklist.md
Created April 20, 2018 14:24
Show Gist options
  • Save AlexeySolovyev/aaa15c7142f27930eb57ea06df9abd26 to your computer and use it in GitHub Desktop.
Save AlexeySolovyev/aaa15c7142f27930eb57ea06df9abd26 to your computer and use it in GitHub Desktop.

Revisions

  1. @jhaddix jhaddix revised this gist Feb 26, 2018. No changes.
  2. @amotmot amotmot revised this gist Apr 30, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -13,7 +13,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f
    ### Recon and analysis

    - [ ] Map visible content
    - [x] Discover hidden & default content
    - [ ] Discover hidden & default content
    - [ ] Test for debug parameters
    - [ ] Identify data entry points
    - [ ] Identify the technologies used
  3. @amotmot amotmot revised this gist Apr 30, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -12,7 +12,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f

    ### Recon and analysis

    - [x] Map visible content
    - [ ] Map visible content
    - [x] Discover hidden & default content
    - [ ] Test for debug parameters
    - [ ] Identify data entry points
  4. @amotmot amotmot revised this gist Apr 30, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -13,7 +13,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f
    ### Recon and analysis

    - [x] Map visible content
    - [ ] Discover hidden & default content
    - [x] Discover hidden & default content
    - [ ] Test for debug parameters
    - [ ] Identify data entry points
    - [ ] Identify the technologies used
  5. @amotmot amotmot revised this gist Apr 30, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -12,7 +12,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f

    ### Recon and analysis

    - [ ] Map visible content
    - [x] Map visible content
    - [ ] Discover hidden & default content
    - [ ] Test for debug parameters
    - [ ] Identify data entry points
  6. @amotmot amotmot revised this gist Apr 16, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -41,7 +41,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f
    - [ ] Check for session fixation
    - [ ] Check for cross-site request forgery
    - [ ] Check cookie scope
    - [x] Access controls
    - [ ] Access controls
    - [ ] Understand the access control requirements
    - [ ] Test effectiveness of controls, using multiple accounts if possible
    - [ ] Test for insecure access control methods (request parameters, Referer header, etc)
  7. @amotmot amotmot revised this gist Apr 16, 2014. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -41,7 +41,7 @@ Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown f
    - [ ] Check for session fixation
    - [ ] Check for cross-site request forgery
    - [ ] Check cookie scope
    - [ ] Access controls
    - [x] Access controls
    - [ ] Understand the access control requirements
    - [ ] Test effectiveness of controls, using multiple accounts if possible
    - [ ] Test for insecure access control methods (request parameters, Referer header, etc)
  8. @amotmot amotmot created this gist Apr 16, 2014.
    104 changes: 104 additions & 0 deletions WAHH_Task_Checklist.md
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,104 @@
    # The Web Application Hacker's Handbook
    Web Application Hacker's Handbook Task checklist as a Github-Flavored Markdown file
    ## Contents
    - [Recon and analysis](#recon-and-analysis)
    - [Test handling of access](#test-handling-of-access)
    - [Test handling of input](#test-handling-of-input)
    - [Test application logic](#test-application-logic)
    - [Assess application hosting](#assess-application-hosting)
    - [Miscellaneous tests](#miscellaneous-tests)

    ## Task Checklist

    ### Recon and analysis

    - [ ] Map visible content
    - [ ] Discover hidden & default content
    - [ ] Test for debug parameters
    - [ ] Identify data entry points
    - [ ] Identify the technologies used
    - [ ] Map the attack surface

    ### Test handling of access
    - [ ] Authentication
    - [ ] Test password quality rules
    - [ ] Test for username enumeration
    - [ ] Test resilience to password guessing
    - [ ] Test any account recovery function
    - [ ] Test any "remember me" function
    - [ ] Test any impersonation function
    - [ ] Test username uniqueness
    - [ ] Check for unsafe distribution of credentials
    - [ ] Test for fail-open conditions
    - [ ] Test any multi-stage mechanisms
    - [ ] Session handling
    - [ ] Test tokens for meaning
    - [ ] Test tokens for predictability
    - [ ] Check for insecure transmission of tokens
    - [ ] Check for disclosure of tokens in logs
    - [ ] Check mapping of tokens to sessions
    - [ ] Check session termination
    - [ ] Check for session fixation
    - [ ] Check for cross-site request forgery
    - [ ] Check cookie scope
    - [ ] Access controls
    - [ ] Understand the access control requirements
    - [ ] Test effectiveness of controls, using multiple accounts if possible
    - [ ] Test for insecure access control methods (request parameters, Referer header, etc)

    ### Test handling of input

    - [ ] Fuzz all request parameters
    - [ ] Test for SQL injection
    - [ ] Identify all reflected data
    - [ ] Test for reflected XSS
    - [ ] Test for HTTP header injection
    - [ ] Test for arbitrary redirection
    - [ ] Test for stored attacks
    - [ ] Test for OS command injection
    - [ ] Test for path traversal
    - [ ] Test for script injection
    - [ ] Test for file inclusion
    - [ ] Test for SMTP injection
    - [ ] Test for native software flaws (buffer overflow, integer bugs, format strings)
    - [ ] Test for SOAP injection
    - [ ] Test for LDAP injection
    - [ ] Test for XPath injection

    ### Test application logic

    - [ ] Identify the logic attack surface
    - [ ] Test transmission of data via the client
    - [ ] Test for reliance on client-side input validation
    - [ ] Test any thick-client components (Java, ActiveX, Flash)
    - [ ] Test multi-stage processes for logic flaws
    - [ ] Test handling of incomplete input
    - [ ] Test trust boundaries
    - [ ] Test transaction logic

    ### Assess application hosting

    - [ ] Test segregation in shared infrastructures
    - [ ] Test segregation between ASP-hosted applications
    - [ ] Test for web server vulnerabilities
    - [ ] Default credentials
    - [ ] Default content
    - [ ] Dangerous HTTP methods
    - [ ] Proxy functionality
    - [ ] Virtual hosting mis-configuration
    - [ ] Bugs in web server software

    ### Miscellaneous tests

    - [ ] Check for DOM-based attacks
    - [ ] Check for frame injection
    - [ ] Check for local privacy vulnerabilities
    - [ ] Persistent cookies
    - [ ] Caching
    - [ ] Sensitive data in URL parameters
    - [ ] Forms with autocomplete enabled
    - [ ] Follow up any information leakage
    - [ ] Check for weak SSL ciphers

    ## References
    * http://mdsec.net/wahh/tasks.html