Web Application Vulnerabilities Checklist

Download Report

Transcript Web Application Vulnerabilities Checklist

Web Application
Vulnerabilities
Checklist
Parameter Checklist
URL request
 URL encoding
 Query string
 Header
 Cookie
 Form field
 Hidden field
 Client side validation
 ‘Tainted’ parameters
 Min/Max lengths
 Concatenate commands

EC-Council

EC-Council
Determine policies for access to content and
functions.
Credential Management

Password storage

Password change

User Update section

Password strength

Lockout policy

Login attempts allowed
EC-Council
Session Management

Token protection

Session Duration

Idle time Duration

Guess Session ID format

Transfer in URL or BODY?

Is Session Id linked to the IP address?

Change Referrer tag
EC-Council
Backend Authentication

Trust relationships

Encryption

Plaintext password in HTML

Password in configuration file.
EC-Council
XSS

Which type – stored or reflected

Check for 404/500 error pages for

return information.

Input validation
EC-Council
MisConfiguration










EC-Council
Nikto results
Nessus results
Patch level
Directory listing
Directory permission
Error messages
Default username/pass
SSL cert. Configuration
Debug or configuration Files
Check for latest vulnerabilities
Unwanted

Backup files

Defaults files

Services

Remote admin. Access
EC-Council

Flaws in access control?

Check for path transversal.

Client side Caching

Check header

Check metatag

Determine file permissions
EC-Council
SQL injection

Mirror website and search for all input
parameters

Gain database related information

Error Messages

Privileges given to the webserver or database
EC-Council
OS calls

Using any interpreter?

OS service calls (e.g. Sendmail)

Mirror and search code for all calls to external
sources.

Privileges given to other services and
webserver.
EC-Council

Complete check of information returned in
error messages. Guess

application logic through errors codes and
messages.

Deconstruction of binary codes (if any)

Is critical data secured and encrypted?
EC-Council
Examine

Token

Cookie

SSID

Serialized Objects
EC-Council
Access points

Regular users

Admin access

Any other?
EC-Council

Ability to brute force at the discovered access
points.

Ability to bypass auth. with spoofed tokens

Ability to conduct replay attack.

Forced browsing, does application keep a check
by tracking request from each user.
EC-Council