pentest-book
  • Welcome
  • Cybersecurity Lecture notes
  • Exploit management
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
      • Subdomain Takeover
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attacks
      • General Info
      • Quick tricks
      • Header injections
      • Bruteforcing
      • Online hashes cracked
      • Crawl/Fuzz
      • LFI/RFI
      • File upload
      • SQLi
      • SSRF
      • Open redirects
      • XSS
      • CSP
      • XXE
      • Cookie Padding
      • Webshells
      • CORS
      • CSRF
      • Web Cache Poisoning
      • Broken Links
      • Clickjacking
      • HTTP Request Smuggling
      • Web Sockets
      • CRLF
      • IDOR
      • Web Cache Deception
      • Session fixation
      • Email attacks
      • Pastejacking
      • HTTP Parameter pollution
      • SSTI
      • Prototype Pollution
      • Command Injection
      • Deserialization
      • DNS rebinding
    • Web Technologies
      • APIs
      • JS
      • ASP.NET
      • JWT
      • GitHub
      • GitLab
      • WAFs
      • Firebird
      • Wordpress
      • WebDav
      • Joomla
      • Jenkins
      • IIS
      • VHosts
      • Firebase
      • OWA
      • OAuth
      • Flask
      • Symfony && Twig
      • Drupal
      • NoSQL (MongoDB, CouchDB)
      • PHP
      • RoR (Ruby on Rails)
      • JBoss - Java Deserialization
      • OneLogin - SAML Login
      • Flash SWF
      • Nginx
      • Python
      • Tomcat
      • Adobe AEM
      • Magento
      • SAP
      • MFA
      • GWT
      • Jira
      • OIDC (Open ID Connect)
      • ELK
      • Sharepoint
      • Others
    • Cloud
      • General
      • Cloud Info Gathering
      • AWS
      • Azure
      • GCP
      • Docker && Kubernetes
      • CDN - Comain Fronting
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windows
      • AD
        • Kerberos
      • PS tips & tricks
  • Mobile
    • General
    • Android
    • iOS
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • Code review
    • Pentesting Web checklist
    • Internal Pentest
    • Web fuzzers review
    • Recon suites review
    • Subdomain tools review
    • Random
    • Master assessment mindmaps
    • BugBounty
    • Exploiting
    • tools everywhere
Powered by GitBook
On this page
  • Recon phase
  • Small scope
  • Medium scope
  • Large scope
  • Network
  • Preparation
  • User management
  • Registration
  • Authentication
  • Session
  • Profile/Account details
  • Forgot/reset password
  • Input handling
  • Error handling
  • Application Logic
  • Other checks
  • Infrastructure
  • CAPTCHA
  • Security Headers
Edit on GitHub
  1. Others

Pentesting Web checklist

PreviousCode reviewNextInternal Pentest

Last updated 2 years ago

Recon phase

Small scope

Medium scope

Large scope

Network

Preparation

User management

Registration

Authentication

Session

Profile/Account details

Forgot/reset password

Input handling

Error handling

Application Logic

Other checks

Infrastructure

CAPTCHA

Security Headers

(, , , , , )

Permute subdomains ()

Subdomain bruteforce (, )

Identify alive subdomains ()

()

Check for (, , )

Subdomains from subdomains (, , )

Take screenshots (, , )

Get for IP ranges (, , , )

Review latest

Check DMARC/SPF policies ()

Open ports with

Check UDP ports ( or nmap)

Test ()

If got creds, try password for all the services discovered

(also my%00email@mail.com for account tko)

Check for password wordlist ( and )

Test 0auth login functionality for

Test response tampering in authentication

If , check common flaws

Try login with common

Bypass tokens

Create a list of features that are pertaining to a user account only and try

File : , No Size Limit, File extension, Filter Bypass, extension, RCE

Check profile picture URL and find email id/user info or

of all downloadable files (Geolocation, usernames)

HTTP in GET & POST (X Forwarded Host)

Path , LFI and RFI

in any request, change content-type to text/xml

Stored

injection with ' and '--+-

injection

HTTP Request

in previously discovered open ports

Try to discover hidden parameters (or )

Check for test credit card number allowed like 4111 1111 1111 1111 ( )

hosting misconfiguration ()

Test storage

Bypass with OCR tool ()

whatweb
webanalyze
Directory enumeration
leaked ids, emails
pwndb
whatwaf
wafw00f
Google dorking
GitHub dorking
githound
git-search
gau
waybackurls
hakrawler
gf-patterns
paramspider
dalfox
bfac
blc
subjs
linkfinder
secretfinder
JSParser
JSFScan
JSScanner
jshole
nuclei
CORScanner
corsy
Enumerate subdomains
subfinder
assetfinder
amass
sudomy
crobat
SubDomainizer
dnsgen
shuffledns
subbrute
httpx
Subdomain takeovers
SubOver
cloud assets
cloudenum
cloudscrapper
cloudlist
Shodan
Transfer zone
altdns
flydns
goaltdns
gowitness
webscreenshot
aquatone
ASN
amass
asnlookup
metabigor
bgp
acquisitions
spoofcheck
Shodan
udp-proto-scanner
SSL
testssl
spraying
Insufficient email verification process
SQL Injections
cewl
burp-goldenNuggets
Open Redirection
SAML
JWT
credentials
Cross-site request forgery
AntiCSRF
CSRF
upload
eicar
burp
EXIF Geolocation Data
Metadata
Reflected XSS
header injection
traversal
XXE
XSS
SQL
NoSQL
Smuggling
Open redirect
SSRF
arjun
parameth
sample1
sample2
Virtual
VHostScan
cloud
easy one