Web application vapt checklist
Web application vapt checklist
Response Manipulation (0 to 1)
OTP Bruteforce
Captch Bypass
Check for race conditions on sensitive functions - coupon, add money, like ,
comment, follow etc by Turbo Intruder
Session Issues
Session Doesnt expire after Logout
Open Redirect
Spider all urls with burp find common params like url, redir_url , redirect
SSRF
Spider all urls with burp find common params like url, redir_url , redirect
CORS
Check using curl with command → curl "https://example.com" -H Origin:evil.com -I
1. Best case
Access-control Allow Origin: evil.com
Access-control Allow Credential: true
2. Best case
Access-control Allow Origin: null
Access-control Allow Credential: true
3. Bad Implementation, Not Exploitable
Access-control Allow Origin: *
Access-control Allow Credential: true
HTML Injection
Check by entering <h1>attacker</h1> in search fields
SQLi
Identify Params by spidering the web app using burp or wayback
Add single or doube quotes to make error and check response (' or ")
Check for most common params using gf xss like file= , document=
Check for most common params using gf patterns like cmd= , exec= etc..
Fuzz Application with to check for RCE with a slug and id command, search for it in
response