Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cybersecurityup/web-pentest-resume-tips
https://github.com/cybersecurityup/web-pentest-resume-tips
Last synced: about 2 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/cybersecurityup/web-pentest-resume-tips
- Owner: CyberSecurityUP
- Created: 2022-05-17T23:57:02.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-05-18T17:07:01.000Z (over 2 years ago)
- Last Synced: 2023-03-05T07:48:49.245Z (almost 2 years ago)
- Size: 270 KB
- Stars: 15
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Web PenTest Resume by Joas
## Test Upload of Malicious Files
### "- Identify the file upload functionality.
### - Review the project documentation to identify what file types are considered acceptable, and what types would be considered dangerous or malicious.
### - Determine how the uploaded files are processed.
### - Obtain or create a set of malicious files for testing.
### - Try to upload the malicious files to the application and determine whether it is accepted and processed."
## Testing for XPath Injection
### - Identify XPATH injection points.
## Default pages with interesting info
### /robots.txt
### /sitemap.xml
### /crossdomain.xml
### /clientaccesspolicy.xml
### /.well-known/
### Check also comments in the main and secondary pages.
## Testing for IMAP SMTP Injection
### "- Identify IMAP/SMTP injection points.
### - Understand the data flow and deployment structure of the system.
### - Assess the injection impacts."
## Test Business Logic Data Validation
### "- Identify data injection points.
### - Validate that all checks are occurring on the back end and can't be bypassed.
### - Attempt to break the format of the expected data and analyze how the application is handling it."
## Testing for Code Injection
### "- Identify injection points where you can inject code into the application.
### - Assess the injection severity."
## Testing for Command Injection
### - Identify and assess the command injection points.
## Testing Directory Traversal File Include
### "- Identify injection points that pertain to path traversal.
### - Assess bypassing techniques and identify the extent of path traversal."
## Scan log4j using BBRF
## S3 Buckets
### Using wappalyzer browser plugin
### Using BURP (spidering the web) or by manually navigating through the page all resources loaded will be save in the History.
### Enumerating AWS User
### Get User Policies
### Get Snapshots
### https://hacktricks.boitatech.com.br/pentesting/pentesting-web/buckets/aws-s3
## Testing for Bypassing Authentication Schema
### - Ensure that authentication is applied across all services that require it.
## Testing GraphQL
### "- Assess that a secure and production-ready configuration is deployed.
### - Validate all input fields against generic attacks.
### - Ensure that proper access controls are applied."
## Login Page Identified
### Testing for Default Credentials
# Enumerate the applications for default credentials and validate if they still exist.
# Review and assess new user accounts and if they are created with any defaults or identifiable patterns.## Review the HSTS header and its validity.
## Review Webpage Content for Information Leakage
## Tools
### https://github.com/qazbnm456/awesome-web-security
### https://book.hacktricks.xyz/pentesting-web/web-vulnerabilities-methodology
### https://book.hacktricks.xyz/pentesting/pentesting-web
### https://github.com/KingOfBugbounty/KingOfBugBountyTips
### https://book.hacktricks.xyz/other-web-tricks
### Amass
### Anew
### Anti-burl
### Assetfinder
### Axiom
### Bhedak
### CF-check
### Chaos
### Cariddi
### Dalfox
### DNSgen
### Filter-resolved
### Findomain
### Fuff
### Gargs
### Gau
### Gf
### Github-Search
### Gospider
### Gowitness
### Hakrawler
### HakrevDNS
### Haktldextract
### Haklistgen
### Html-tool
### Httpx
### Jaeles
### Jsubfinder
### Kxss
### LinkFinder
### log4j-scan
### Metabigor
### MassDNS
### Nuclei
### Naabu
### Qsreplace
### Rush
### SecretFinder
### Shodan
### ShuffleDNS
### SQLMap
### Subfinder
### SubJS
### Unew
### WaybackURLs
### Wingman
### Notify
### Goop
### Tojson
### GetJS
### X8
### Unfurl
### XSStrike
### Page-fetch
### Burp Suite
### OWASP-ZAP
### Nikto
### Waybackurl
### Wfuzz
### SecList
### TurboSearch
## CVE Scans
## Content Discovery
## File Backups
## Type of CMS
### JBoss
### ColdFusion
### Weblogic
### Tomcat
### Railo
### Axis2
### Glassfish
### Wordpress
### Drupal
### Joomla
### vbulletin
### Moodle
### https://book.hacktricks.xyz/network-services-pentesting/pentesting-web
## Google Dorks
### https://www.exploit-db.com/google-hacking-database
## Shodan Check URL
## Waybackup Machine
## Check Web Directorys
## Check .git
## Check .env
## Hidden Parameters Discovery
## Server Vulnerabilities Identificaiton
## Search CORS
## Verificy CERT SSL
## Spoofcheck
## Extract .js in Subdomains
## API Endpoints
## Web Spidering
## Server Version Identification
## Check if you have any WAF
### Imperva
### Cloudflare
### Sucuri
### Fortiweb
### AWS WAF
### Barracuda
## DNS Transfer Zone
## Extract Subdomains
## API Keys
## Forcing Erros
## Robots.txt
## CMS Scanners
## Github Recon and Sensitive Information
## ASN Identification
## Tomcat Discovery information Sensitive
## Cloud Discovery
## Whois
## Plugins and Libraries Vulnerable
## Old Content
## Tomcat Admin Page
## Data Input
### Data Input Parameters Testing
## Asset Identification
## CGI Server Scanner
## Misconfigurations in Server and Application
## Parser Logics
## Database Identified
### MySQL
### MSSQL
### Oracle
## phpmyadmin Identified
## Phpinfo
### Exact PHP version.
### Exact OS and its version.
### Details of the PHP configuration.
### Internal IP addresses.
### Server environment variables.
### Loaded PHP extensions and their configurations.
## Review Webserver Metafiles for Information Leakage
## OSINT Framework
### https://osintframework.com/
## Enumerate supported HTTP methods.
## Test for access control bypass.
## Test XST vulnerabilities.
## Test HTTP method overriding techniques.
## Testing for Privilege Escalation
### "- Identify injection points related to privilege manipulation.
### - Fuzz or otherwise attempt to bypass security measures."
## Testing for Reflected Cross Site Scripting
### "- Identify variables that are reflected in responses.
### - Assess the input they accept and the encoding that gets applied on return (if any)."
## Testing for Stored Cross Site Scripting
### "- Identify stored input that is reflected on the client-side.
### - Assess the input they accept and the encoding that gets applied on return (if any)."
## Testing for HTTP Verb Tampering
## Testing for HTTP Parameter Pollution
### "- Identify the backend and the parsing method used.
### - Assess injection points and try bypassing input filters using HPP."
## Testing for SQL Injection
### "- Identify SQL injection points.
### - Assess the severity of the injection and the level of access that can be achieved through it."
## Testing for LDAP Injection
## Testing for XML Injection
### "- Identify XML injection points.
### - Assess the types of exploits that can be attained and their severities."
## Testing for SSI Injection
### "- Identify SSI injection points.
### - Assess the severity of the injection."
## Testing for Format String Injection
### - Assess whether injecting format string conversion specifiers into user-controlled fields causes undesired behaviour from the application.
## Testing for Incubated Vulnerability
### "- Identify injections that are stored and require a recall step to the stored injection.
### - Understand how a recall step could occur.
### - Set listeners or activate the recall step if possible."
## Testing for HTTP Splitting Smuggling
### "- Assess if the application is vulnerable to splitting, identifying what possible attacks are achievable.
### - Assess if the chain of communication is vulnerable to smuggling, identifying what possible attacks are achievable."
## Testing for HTTP Incoming Requests
### "- Monitor all incoming and outgoing HTTP requests to the Web Server to inspect any suspicious requests.
### - Monitor HTTP traffic without changes of end user Browser proxy or client-side application."
## Testing for Host Header Injection
### "- Assess if the Host header is being parsed dynamically in the application.
### - Bypass security controls that rely on the header."
## Testing for Server-side Template Injection
## Testing for Server-Side Request Forgery
## Forcing errors
### Access fake pages like /whatever_fake.php (.aspx,.html,.etc)
### Add "[]", "]]", and "[[" in cookie values and parameter values to create errors
### Generate error by giving input as /~randomthing/%s at the end of URL
### Try different HTTP Verbs like PATCH, DEBUG or wrong like FAKE
## Map Application Architecture
### - Generate a map of the application at hand based on the research conducted.
## Search .json subdomain
## Checking invalid certificate
## Search to files using assetfinder and ffuf
## Using shodan to jaeles
## Browser Extensions
### Postman Interceptor
### EditThisCookie
### d3coder
## Reporting Tool
### template-generator
### bountyplz
### dradisframework
### Serpico
## Proxies
### Abusing hop-by-hop headers
### Cache Poisoning/Cache Deception
### HTTP Request Smuggling
### H2C Smuggling
### Server Side Inclusion/Edge Side Inclusion
### Uncovering Cloudflare
### XSLT Server Side Injection
## PortScanner Identification
## Check Response HTTP/HTTPS
## Test for Subdomain Takeover
### Enumerate all possible domains (previous and current).
### Identify forgotten or misconfigured domains.
## Bypasses
### Bypass Payment Process
### Captcha Bypass
### Login Bypass
### Race Condition
### Rate Limit Bypass
### Reset Forgotten Password Bypass
### Registration Vulnerabilities
### 2FA/OPT Bypass