WSTG (Web Application Security Testing) OWASP - Mind Map
WSTG (Web Application Security Testing) OWASP - Mind Map
- [ ] Reverse Lookup
- [ ] Google Dorking
- [ ] Github Recon
- [ ] Directory Enumeration
- [ ] IP Range Enumeration
- [ ] JS Files Analysis
- [ ] Subdomain Takeover
- [ ] Parameter Fuzzing
- [ ] Port Scanning
- [ ] Template-Based Scanning(Nuclei)
- [ ] Wayback History
- **Authentication Testing**
- [ ] Username enumeration
- [ ] Change password
- [ ] Manage 2FA
- OAuth Roles
- [ ] Client Application → [
Twitterdeck.com](http://twitterdeck.com/)
- [ ] client_id → Twitterdeck ID (
This is a public, non-secret unique
identifier_
- [ ] refresh_token → Allows an
application to obtain a new access_token
without prompting the user
- Code Flaws
- Redirect_uri Flaws
- [ ] Subdomains allowed (
Subdomain Takeover or Open redirect on
those subdomains): ?redirect_uri=https://
sub.twitterdeck.com
- [ ] Weak Regexes
- State Flaws
- Misc
- [ ] Is client_secret validated?
- [ ] Response Manipulation
- [ ] Status Code
- [ ] Manipulation
- [ ] Is CAPTCHA implemented on
contact us form in order to restrict email
flooding attacks?
- [ ] Blind XSS
- Buy Now
- Gift/Voucher
- Address
- Place Order
- Track Order
- Billing Activity
- Deposit/Loan/Linked/External
Account Checking
```markup
/{payload}
?next={payload}
?url={payload}
?target={payload}
?rurl={payload}
?dest={payload}
?destination={payload}
?redir={payload}
?redirect_uri={payload}
?redirect_url={payload}
?redirect={payload}
/redirect/{payload}
/cgi-bin/redirect.cgi?{payload}
/out/{payload}
/out?{payload}
?view={payload}
/login?to={payload}
?image_url={payload}
?go={payload}
?return={payload}
?returnTo={payload}
?return_to={payload}
?checkout_url={payload}
?continue={payload}
?return_path={payload}
```
- [ ] Simple characters
- [ ] Multiple encoding
- [ ] Merging characters
- [ ] Logic Testing
- [ ] Weird characters
- [ ] python [sqlmap.py](http://
sqlmap.py/) r ~/Desktop/textsqli.txt
proxy= [http://127.0.0.1:8080](http://127.0.
0.1:8080/)
- Bypassing WAF
- [ ] URL encoding
- Time Delays
```markup
Oracle dbms_pipe.receive_
message(('a'),10)
```
- Conditional Delays
```markup
Microsoft IF (YOUR-CONDITION-
HERE) WAITFOR DELAY '0:0:10'
```
- [ ] Payload to be inserted -“
onfocus=”alert(document.cookie)"
- **CSRF Testing**
- **SSO Vulnerabilities**
- [ ] If internal.company.com Redirects
You To SSO e.g. auth.company.com, Do
FUZZ
On Internal.company.com
- [ ] If company.com/internal Redirects
You To SSO e.g. Google login, Try To Insert
- [ ] If There Is
AssertionConsumerServiceURL In Token
Request Try To Insert Your
- [ ] If There Is
AssertionConsumerServiceURL In Token
Request Try To Do FUZZ
https://github.com/OWASP/wstg/tree/
On Value Of master/document/4-Web_Application_
AssertionConsumerServiceURL If It Is Not Security_Testing
Similar To Origin
Project https://owasp.org/www-project-web-
- [ ] If There Is Any UUID, Try To Change security-testing-guide/latest/
It To UUID Of Victim Attacker e.g. Email Of
- [ ] Try To Inject XSLT Payloads Into Identify stored input that is reflected on
The Transforms Element As A Child the client-side.
<!DOCTYPE tushar [ Testing for Server-Side Request Forgery Test if the injection points are exploitable.
<!ENTITY xxe SYSTEM "file:///etc/ Identify and assess the command injection
passwd" >]><tushar>&xxe;</ Testing for Command Injection points.
"root=", https://github.com/enaqx/awesome-
pentest
"cfg=",
https://github.com/arch3rPro/
"dest=", PentestTools
"path=", Subdomain
"continue=",
Google Hacking
"url=",
GHDB - Google Hack Database
"window=",
SearchDiggity - SearchDiggity 3.1 is the
"next=", primary attack tool of the Google Hacking
Diggity Project
"data=",
Katana - A Python Tool For google Hacking
"reference=",
uDork - uDork is a script written in Bash
"site=", Scripting that uses advanced Google
search techniques to obtain sensitive
"html=", information in files or directories, find IoT
devices, detect versions of web
"val=", applications, and so on.
"callback=", Github
"to=",
GitMiner - Tool for advanced mining for
content on Github.
"out=",
Phishing
```markup
gophish - Open-Source Phishing Toolkit
http://instance-data
AdvPhishing - This is Advance Phishing
http://169.254.169.254 Tool ! OTP PHISHING
Web Applications
http://169.254.169.254/metadata/
Xunfeng - The patrol is a rapid emergency
instance/network/interface/0/ipv4/
response and cruise scanning system for
ipAddress/0/publicIpAddress?api-version=
enterprise intranets
2017-04-02&format=text
- [ ] upload the malicious file to the Validate that used frameworks and
archive upload functionality and observe Test Network Infrastructure Configuration systems are secure and not susceptible to
how the application responds known vulnerabilities due to unmaintained
software or default settings and
- [ ] upload a file and change its path to credentials.
overwrite an existing system file
Ensure that defaults and known files have
- [ ] Large File Denial of Service been removed.
- [ ] Reusuable Captcha Test HTTP Strict Transport Security Review the HSTS header and its validity.
- [ ] Check if captcha is retrievable with Test RIA Cross Domain Policy Review and validate the policy files.
the absolute path such as
Review and identify any rogue file
[www.tushar.com/internal/captcha/ Test File Permission permissions.
images/24.png](http://www.chintan.com/
internal/captcha/images/24.png) Enumerate all possible domains (previous
and current).
- [ ] Check for the server side validation Test for Subdomain Takeover
for CAPTCHA.Remove captcha block from Identify forgotten or misconfigured
GUI using firebug addon and submit domains.
request to the server
Assess that the access control
- [ ] Check if image recognition can be configuration for the storage services is
done with OCR tool? Configuration and Deployment Test Cloud Storage properly in place.
Management Testing
- **JWT Token Testing** Review the Content-Security-Policy
header or meta element to identify
- [ ] Brute-forcing secret keys Testing for Content Security Policy misconfigurations.
- [ ] Pixel flood, using image with a IBM WebSphere V5.0 Security, WebSphere
huge pixels Handbook Series, by Peter Kovari et al.,
IBM, December 2002.
- [ ] Frame flood, using GIF with a huge
frame IBM WebSphere V4.0 Advanced Edition
Security, by Peter Kovari et al., IBM, March
- [ ] ReDoS (Regex DoS) 2002.
- [ ] Forced browsing
- [ ] by redirecting output
- Broken Cryptography
- [ ] Cryptography Implementation
Flaw
- [ ] Encrypted Information
Compromised
Testing WebSockets
Assess its implementation by using the
same tests on normal HTTP channels.
Review whether new user accounts are Testing for Default Credentials
created with weak or predictable
passwords.