Web app pentesting methodology
The following documentation provides a standard guideline for web application penetration testing engagements.
Last updated
The following documentation provides a standard guideline for web application penetration testing engagements.
Last updated
Manual
robots.txt
sitemap.xml
Tools
gobuster, wfuzz, ffuf, etc.
...
Wordlists
usr/share/SecLists/Discovery/...
/usr/share/wfuzz/...
Utilizing the word lists, common file extensions such as .txt
, .php
, .pdf
, etc. can be appended to discover specific named files.
Common ways to find out if the application is using a SQL database:
a) Fuzz with a few common SQL Injection inputs and observer the response
b) ...
a) Look for file upload features
b) Test with a valid input — observe the response
c) Test with malicious input such as .php
extension — observe the response
...
a) Default credentials for common known services
b) ...