Web Application Security Testing
Web Application Security Testing
No Caption is available
It has always been my Passion to learn new things, explore new ideas and
thoughts and emphasized on self-development. It has always been my focus on
every available opportunity to improve myself skills. I want to pursue my goals
with dedication, sincerity, honesty and hard work.
Today I will discuss How I test vulnerabilities of a Target Website and what is my
Methodology. So Let’s START !!
Web Application Security Testing Method
M ethodology:
Recon
3. Google Dorking
4. Github Dorking
5. Port Scanning
7. Whois Lookup
8. WAF Identification
9. Shodan Dorking
Enumeration
2. Subdomain Enumeration
4. URL Extraction
5. Content Discovery
6. Finding Parameters
7. Sorting URLs
Vulnerability Scanning
So Now Let’s Start the Journey to find out the Bugs in our Target Website !!
Step 01 —
Footprinting Website
First of all, I would like to footprint my Target website through some reputed
methods and Techniques !!
6. Monitoring Target using Alerts [ Tools — Google Alerts, Twitter Alerts. Giga
Alerts ]
12. Analyze the Directory Structure of the Target Website [ Tools — Httrack ]
13. Find out the Archive and Analyze previous data [ Tools — ViewDns,
https://web.archive.org ]
14. Extracting Meta Data of the Public Documents [ Tools — Exitfool, Web Data
Extractor, Metagoofil ]
Step 02 —
Now Let’s Recon our Target Website through some Browser Addons !!
1. Finding the Technology which are used to build our Target Website [ Tools —
Wappalyzer, BuiltWith ]
Step 03—
Google Dorking
Online Resource:
– https://github.com/chr3st5an/Google-Dorking
— https://www.stationx.net/how-to-google-dork-a-specific-website/
Step 04 —
Github Dorking
Github Dorking !!
Step 05—
Port Scanning
Now Let’s Scan the Ports of our Target Website through some necessary tools so
that we can find out the way of Attacking !! Haha..
1. Nmap [ https://www.stationx.net/nmap-cheat-sheet/ ]
2. UnicornScan [ https://0xsp.com/offensive/offensive-cheatsheet/ ]
4. Netcat [ https://0xsp.com/offensive/offensive-cheatsheet/ ]
Step 06 —
2. DNS Lookup
3. MxToolbox
4. Nslookup
5. Viewdns
Step 07 —
Whois Lookup
Step 08—
WAF Identification
In this case we need to identify our Target website is WAF Protected or Not. That’s
why can use 2 different tools to complete the same task.
1. Wafw00f [ https://github.com/EnableSecurity/wafw00f ]
2. WhatWaf [ https://github.com/Ekultek/WhatWaf ]
Step 09 —
Shodan Dorking
Step 10 —
Step 11 —
Subdomain Enumeration
Let’s discuss the top 10 subdomain search tools that can help you discover
subdomains.
5. Assetnote [ A tool for asset discovery and monitoring, helping with subdomain
identification and tracking changes over time. ]
10. Aquatone [ A tool that helps visualize and gather information about domains,
including subdomains, by combining techniques like screenshotting. ]
Step 12—
There is a tool called HTTPX, which is used to check Subdomains are Active or Not
and there are multiple methods to use this tool. We will see the simple method
only.
▶ You’ll able to see the active subdomains only, on which you can start finding
bugs and all.
Step 13—
URL Extraction
1. Httpx
2. WaybackURLs
Step 14—
Content Discovery
1. Httpx
2. Gobuster
3. Dirbuster
Step 15—
Finding Parameters
We are going to enumerate a web application to find out hidden parameters of the
Target website,
1. Arjun Tool
2. ParamSpider
3. WaybackURL
Step 16—
Sorting URLs
GF tool is a powerful command-line utility that acts as a wrapper around the grep
command, providing additional functionality and convenience for searching and
filtering text.
Link — https://github.com/tomnomnom/gf
Step 17—
Step 18 —
First of all let’s talk about the Category and Sub categories of the OWASP Top 10
Vulnerabilities because if you know what are the bugs, then you can exploit those
through your own methodologies of Testing.
OWASP Top 10 2021 — Bug Name Examples by Category:
A01: Broken Access Control
IDOR
Directory or Path Traversal
Function Injection
Privilege Escalation
Horizontal and Vertical Privilege Escalation
A03: Injection
Os Command Injection
SQL Injection
Cross-Site Scripting (XSS)
Expression Language Injection
XML Injection
LDAP Injection
NoSQL Injection
SSTI
Security-by-Obscurity
Session Fixation
Unintended Functionality
Use of Hardcoded Credentials
Weak Error Handling
A05: Security Misconfiguration
Brute-Force Attacks
Credential Stuffing
Credential Theft
Session Hijacking
Weak Password Policies
Weak Session Cookies
Lack of Multi-Factor Authentication (MFA)
Insecure Session Management
Insecure Authentication Protocols
Insecure Password Storage
User Enumeration
Unauthenticated SSRF
Authenticated SSRF
Now you can test your Target website with several techniques to find out the
vulnerabilities. Recommending to follow the related writeups of the vulnerability.
Step 19—
4. Patchstack — https://patchstack.com/database/
Step 20—
Report Writing
Report Structure:
A security testing report should have a clear and logical structure. Here’s a
recommended structure:
a. Introduction: Provide a brief overview of the security testing context, objectives,
and report scope.
b. Methodology: Describe the techniques and tools used to conduct the security
testing.
f. Conclusion: Summarize the key points of the report and express gratitude to
relevant parties.
COLLECTED BY @INTELEON404
Signature