DAST - Checklist (2) 5
DAST - Checklist (2) 5
A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, dir
Attackers can exploit vulnerable XML processors if they can upload XML or include hostile content in an XML document, explo
Many
Many web
web applications
applications do
do not
not properly
properly protect
protect sensitive
sensitive data,
data, such
such as
as credit
credit cards,
cards, tax
tax IDs,
IDs, and
and authentication
authentication credentials.
credentials. Att
Att
A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any
This script is possibly vulnerable to unrestricted file upload. Various web applications allow users to upload files (such as pictur
Formula or CSV injection is by an attacker to get shell or to execute some malicious commands from a user
Local file inclusion attack is used to include the local file of the system/server on live application
Remote file inclusion attack is used to execute malicious commands remotely(using RFI we can get the shell also)
(SSRF) refers to an attack where in an attacker is able to send a crafted request from a vulnerable web application
Applications unwitingly give admin or some upper level access to normal user which should be do in this way
Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict
It includes everything from unlogged events, logs that are not stored properly and warnings where no action is taken within re
HTML injection is an attack that is similar to Cross-site Scripting (XSS). ... Attacker discovers injection vulnerability and decides
HTML injection is an attack that is similar to Cross-site Scripting (XSS). ... Attacker discovers injection vulnerability and decides
Hyperlink Injection vulnerability arises when the attacker's injected hyperlink gets successfully sent in the emails. Majority of t
Insecure design is a broad category representing different weaknesses, expressed as “missing or ineffective control design
Cross-Frame Scripting (XSS) is an attack that combines malicious JavaScript with an iframe that loads a legitimate page in an eff
Command injection
Attackers can exploitisvulnerable
a cyber attack
XMLthat involvesifexecuting
processors arbitrary
they can upload XMLcommands
or includeonhostile
a hostcontent
operating system
in an XML (OS). Typically,
document, exploth
LDAP Injection is an attack technique used to exploit web sites that construct LDAP statements from user-supplied input
PHPmyadmin should not be accessible for all user
The connection string may include attributes such as the name of the driver, server and database
An attacker can bypass authentication using sql commands
In which malicious scripts are injected in request paramter then send it to victim and when victim click on the URL/request the
In which malicious scripts are injected in request paramter then send it to victim and when victim click on the URL/request the
DOM Based XSS (or as it is called in some texts, “type-0 XSS”) is an XSS attack wherein the attack payload is executed as a resu
If your application fails to appropriately restrict URL access, security can be compromised through a technique called forced br
Business logic vulnerabilities are flaws in the design and implementation of an application that allow an attacker to elicit unint
Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into a tem
Client-side template injection vulnerabilities arise when applications using a client-side template framework dynamically embe
Access control (or authorization) is the application of constraints on who (or what) can perform attempted actions or access re
Attackers have access to hundreds of millions of valid username and password combinations for credential stuffing, default ad
OTP Bypass may lead to access the sensitive files and details.
Components, such as libraries, frameworks, and other software modules, almost always run with full privileges. If a vulnerable
Definition
A directoryoflisting
'PathisTraversal' Definition:
inappropriately Path Traversal
exposed, is one of the
yielding potentially many critical
sensitive web application
information security
to attackers. vulnerabilities.
Extended Description.It Aem
d
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into
An can expliot or bypass the authentication if the users are using default credentials
An attacker use brute force attack to unlock the account at login page or can use to retrieve information such as username fro
Sensitive data in url is harmful for a user, the attacker can read the information
Some application redirects the user to malicious web app which is harmful for a user.
Security misconfiguration can happen at any level of an application stack, including the platform, web server, application serve
XST could be used as a method to steal user's cookies via Cross-site Scripting (XSS) even if the cookie has the "HttpOnly" flag se
A session should expire after a limited time of logged in user
This enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/.
Sometimes when attacker use malicious sql commands the web apps gives sql query on the web page
Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/
Improper handling of errors can introduce a variety of security problems for a web site. The most common problem is when d
The web application doesn't expire on password change if it is already open in another browser.
The web application doesn't expire on email change if it is already open in another browser.
Lack of Resources & Rate Limiting is when the API does not restrict the number or frequency of requests from a particular API
The process of sending large quantities of emails, often with large attachments, in order to disable a network or part of a netw
OTP flooding mostly occurs when there is no rate limit is implemented on the OTP request an application can make.
The HTTP host header injection is an attack in which a malevolent actor tampers with the host header in a client request. This
The application should use HTTP headers for protecting the web site against script and other types of attack
Autocomplete feature should be On in login page
A web application should implement password change policy with old password
A website sometimes display http error and those errors reveal information about system
Web application uses no account lockout policy and an attacker can brute force the username and passoword to get access of
Web application provides a feature called as remember password which harmful for a user.
Web app allows user to set a weak passwords which is harmful for them
A weak crossdomain.xml file can allow the cybercriminal to access several types of confidential information.
Applications should validate the user commands
In which an attacker plays with the parameter of request by enter large value of parameter in request so that page doesn’t giv
a cookie is set with the HTTPOnly flag, it instructs the browser that the cookie can only be accessed by the server and not by c
This value informs the browser what kind of data to expect. If this header is missing, the browser may incorrectly handle the d
When a cookie is set with the Secure flag, it instructs the browser that the cookie can only be accessed over secure SSL channe
Applications generally provide concurrent login but for more security it should provide only one login functionality at a time
Banner grabbing or OS fingerprinting is a method to determine the operating system running on a remote target system
If Captcha is not implemented on Login/Forgot password page then it may lead to automation attacks
The HTTP referrer is an optional HTTP header field that identifies the address of the webpage which is linked to the resource b
The web application uses Laravel framework. Laravel Debug mode is enabled. Debug mode should be turned off in production
Exif Data stores sensitive information like Geo-location, Date, Name of the camera, Modified date, Time, Sensing Method, File
Attacker could bypass the intended protection of the CAPTCHA challenge and perform actions at a higher frequency than huma
https://sqlwiki.netspi.com/detection OR http://securityidiots.com/Web-Pentest/SQL-
Reference URL
Injection/Part-1-Basic-of-SQL-for-SQLi.html
https://sqlwiki.netspi.com/detection OR http://securityidiots.com/Web-Pentest/SQL-
Injection/Part-1-Basic-of-SQL-for-SQLi.html
https://sqlwiki.netspi.com/detection OR http://securityidiots.com/Web-Pentest/SQL-
Injection/Part-1-Basic-of-SQL-for-SQLi.html
https://sqlwiki.netspi.com/detection OR http://securityidiots.com/Web-Pentest/SQL-
Injection/Part-1-Basic-of-SQL-for-SQLi.html
https://sqlwiki.netspi.com/detection OR http://securityidiots.com/Web-Pentest/SQL-
Injection/Part-1-Basic-of-SQL-for-SQLi.html
https://portswigger.net/kb/issues/00100210_sql-injection-second-order
https://hdivsecurity.com/owasp-broken-authentication-and-session-management
http://www.hackingarticles.in/beginner-guide-insecure-direct-object-references/
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
https://blog.detectify.com/2016/07/01/owasp-top-10-sensitive-data-exposure-6/
https://www.owasp.org/index.php/Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)
http://www.hackingarticles.in/understanding-csrf-vulnerability-beginner-guide/
http://www.hackingarticles.in/file-upload-exploitation-bwapp-bypass-security/
https://payatu.com/csv-injection-basic-to-exploit/
http://www.hackingarticles.in/5-ways-exploit-lfi-vulnerability/
https://teamultimate.in/local-file-inclusion-lfi-remote-file-inclusion-rfi/
https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/
https://searchsecurity.techtarget.com/definition/privilege-escalation-attack
https://blog.detectify.com/2018/03/21/owasp-top-10-insecure-deserialization/
https://blog.detectify.com/2018/04/06/owasp-top-10-insufficient-logging-monitoring/
https://teamultimate.in/html-injection-reflected-stored/
https://teamultimate.in/html-injection-reflected-stored/
https://owasp.org/Top10/A04_2021-Insecure_Design/
https://www.owasp.org/index.php/Cross_Frame_Scripting
https://www.owasp.org/index.php/Command_Injection
http://projects.webappsec.org/w/page/13247005/XPath%20Injection
http://projects.webappsec.org/w/page/13246947/LDAP%20Injection
https://www.acunetix.com/vulnerabilities/web/database-connection-string-disclosure
https://support.portswigger.net/customer/portal/articles/2791007-Methodology_SQL_Injection_Authentication_.html
http://phpsecurity.readthedocs.io/en/latest/Cross-Site-Scripting-(XSS).html
http://phpsecurity.readthedocs.io/en/latest/Cross-Site-Scripting-(XSS).html
https://owasp.org/www-community/attacks/DOM_Based_XSS#
https://www.veracode.com/security/failure-restrict-url-access
https://portswigger.net/web-security/logic-flaws#
https://portswigger.net/web-security/server-side-template-injection
https://portswigger.net/kb/issues/00200308_client-side-template-injection
https://portswigger.net/web-security/access-control
https://owasp.org/www-project-top-ten/2017/A2_2017-Broken_Authentication
https://systemweakness.com/bypassing-otp-verification-797851057e79
https://www.owasp.org/index.php/Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities
https://www.tinfoilsecurity.com/blog/what-is-path-traversal
http://lifeofpentester.blogspot.in/2013/10/directory-browsing-vulnerability.html
https://www.lookingglasscyber.com/blog/threat-intelligence-insights/x-frame-options-clickjacking/
https://www.owasp.org/index.php/Testing_for_default_credentials_(OTG-AUTHN-002)
https://www.owasp.org/index.php/Brute_force_attack
https://www.owasp.org/index.php/Information_exposure_through_query_strings_in_url
https://www.owasp.org/index.php/Unvalidated_Redirects_and_Forwards_Cheat_Sheet
https://blog.detectify.com/2016/06/17/owasp-top-10-security-misconfiguration-5/
https://deadliestwebattacks.com/2010/05/18/cross-site-tracing-xst-the-misunderstood-vulnerability/
https://www.htbridge.com/vulnerability/insufficient-session-expiration.html
https://www.owasp.org/index.php/Full_Path_Disclosure
https://owasp.org/www-community/attacks/Full_Path_Disclosure#:~:text=Full%20Path%20Disclosure%20(FPD)%20vulnerabil
https://owasp.org/www-community/Improper_Error_Handling
https://securityboulevard.com/2021/07/api-security-101-lack-of-resources-rate-limiting/#
https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095749306#
https://crashtest-security.com/invalid-host-header/#:~:text=What%20is%20a%20Host%20header,the%20client%20in%20the%
https://www.owasp.org/index.php/OWASP_Secure_Headers_Project
https://www.acunetix.com/vulnerabilities/web/password-type-input-with-auto-complete-enabled
https://www.owasp.org/index.php/Testing_for_weak_password_change_or_reset_functionalities_(OTG-AUTHN-009)
https://www.owasp.org/index.php/Testing_for_Error_Code_(OTG-ERR-001)
https://vulnerabilities.teammentor.net/article/577e90c9-8e44-4240-b00f-768316d63901
https://www.owasp.org/index.php/Testing_for_Vulnerable_Remember_Password_(OTG-AUTHN-005)
https://www.acunetix.com/vulnerabilities/web/weak-password
https://www.paladion.net/blogs/weak-crossdomain-xml-and-its-exploitation-poc
https://www.owasp.org/index.php/Testing_for_Input_Validation
https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/414
https://portswigger.net/kb/issues/00500600_cookie-without-httponly-flag-set
https://www.acunetix.com/vulnerabilities/web/content-type-is-not-specified
https://portswigger.net/kb/issues/00500200_ssl-cookie-without-secure-flag-set
http://appsecnotes.blogspot.com/2009/05/simultaneous-sessions-for-single-user.html
https://haklab.net/banner-grabbing-foot-printing-network-scanning/
https://www.geeksforgeeks.org/cross-domain-referrer-header-leakage/
https://www.acunetix.com/vulnerabilities/web/laravel-debug-mode-enabled/
https://beaglesecurity.com/blog/vulnerability/exif-data-information-leakage.html
https://blog.securelayer7.net/owasp-top-10-insufficient-attack-protection-7-captcha-bypass/
_channels_(OTG-CRYPST-003)
on_Authentication_.html
Path Traversal | OWASP Foundation
closure%20(FPD)%20vulnerabilities,file%20they%20wish%20to%20view.
der,the%20client%20in%20the%20response.
24. Security Testing (Basics) - Input Validation and Output Encoding - YouTube