Web Application Penetration Testing by OWASP | |
Information Gathering | Testing: Spiders, robots, and Crawlers |
Search engine discovery/Reconnaissance | |
Identify application entry points | |
Testing for Web Application Fingerprint | |
Application Discovery | |
Analysis of Error Codes | |
Configuration Management Testing | SSL/TLS Testing |
DB Listener Testing | |
Infrastructure configuration management testing | |
Application configuration management testing | |
Testing for File extensions handling | |
Old, backup and unreferenced files | |
Infrastructure and Application Admin Interfaces | |
Testing for HTTP Methods and XST | |
Authentication Testing | Credentials transport over an encrypted channel |
Testing for user enumeration | |
Default or guessable (dictionary) user account | |
Testing For Brute Force | |
Testing for Bypassing authentication schema | |
Testing for Vulnerable remember password and pwd reset | |
Testing for Logout and Browser Cache Management | |
Testing for Captcha | |
Testing for Multiple factors Authentication | |
Testing for Race Conditions | |
Session Management Testing | Testing for Session Management Schema |
Testing for Cookies attributes | |
Testing for Session Fixation | |
Testing for Exposed Session Variables | |
Testing for CSRF | |
Authorization testing | Testing for path traversal |
Testing for bypassing authorization schema | |
Testing for Privilege Escalation | |
Business logic testing | |
Data Validation Testing | Testing for Reflected Cross Site Scripting |
Testing for Stored Cross Site Scripting | |
Testing for DOM based Cross Site Scripting | |
Testing for Cross Site Flashing | |
SQL Injection | |
LDAP Injection | |
ORM Injection | |
XML Injection | |
SSI Injection | |
XPath Injection | |
IMAP/SMTP Injection | |
Code Injection | |
OS Commanding | |
Buffer overflow Testing | |
Incubated vulnerability testing | |
Testing for HTTP Splitting/Smuggling | |
Denial of Service Testing | Testing for SQL Wildcard Attacks |
Locking Customer Accounts | |
Buffer Overflows | |
User Specified Object Allocation | |
User Input as a Loop Counter | |
Writing User Provided Data to Disk | |
Failure to Release Resources | |
Storing too Much Data in Session | |
Web Services Testing | WS Information Gathering |
Testing WSDL | |
XML Structural Testing | |
XML Content-level Testing | |
HTTP GET parameters/REST Testing | |
Naughty SOAP attachments | |
Replay Testing | |
AJAX Testing | AJAX Vulnerabilities |
Testing For AJAX |
Önceleri web uygulama güvenliğine özel olması düşünülen blog, daha sonra diğer sızma testleri konularını da kapsayacak şekilde genişletilmiştir.
29 Mayıs 2010 Cumartesi
OWASP - Web Application Penetration Testing Tree
Kaydol:
Kayıt Yorumları (Atom)
Web Uygulama Sızma Testleri İçin Kontrol Listeleri - V
Checklist for Web App Pentesting - V 6. Veri Denetimi (Data Validation) Testleri 6.1 Girdi Denetimi Bütün girdiler denetlenmelidir....
-
& (%26) URL sorgu tümcesindeki parametreleri mesaj gövdesinden ayırmada kullanılır. = (%3d) URL sorgu tümcesindeki parametrelerin i...
-
Checklist for Web App Pentesting - V 6. Veri Denetimi (Data Validation) Testleri 6.1 Girdi Denetimi Bütün girdiler denetlenmelidir....
-
Bu yazı, web uygulama sızma testleri sırasında kullanılan araç çeşitlerini konu almıştır. Bu araçların hangi amaçla kullanıldığı anlatılarak...
Hiç yorum yok:
Yorum Gönder