WAPT_Checklists
WAPT_Checklists
Open-Source Reconnaissance
o Use Gobuster
o Use Whatweb
Test HSTS
o Ensure low privilege users can’t able to access high privilege resources
o Ensure the same user or identity can’t register again and again
o Check the response when a valid username and an invalid password entered
AUTHENTICATION TESTING
o Ensure the account has been locked after 3-5 incorrect attempts
o Ensure the token must expire after not being used for a long time
Test For Weak Password Change Function
o Ensure the other sessions got destroyed after the password change
AUTHORIZATION TESTING
o Check CSRF by removing the CSRF token and using a blank parameter
o Check CSRF by replacing the CSRF token with its own values
o Ensure after logout we can’t able to access the dashboard by pressing the back
button
o Ensure proper session timeout has been set
o Test by replacing < and > with HTML entities < and >
o Try SQL Injection with null bytes before the SQL query
o Test for HHI by swapping the real Host and X-Forwarded Host parameter
o Test for HHI by adding the target values in front of the original values
o Test for HHI by adding the target with a slash after the original values
o Search for SSRF keywords only under the request header and body
o Ensure the digital certificates should have at least 2048 bits of key length
o Ensure the digital certificates should have at least SHA-256 signature algorithm
o Ensure the digital certificates should not use MDF and SHA-1
o Test malicious file upload by putting your IP address on the file name
o Test malicious file upload by Inserting the payload inside of an image by the bmp.pl
tool
o Test for URL redirection by creating a new subdomain with the same as the target