Skip to content

Instantly share code, notes, and snippets.

@jhaddix
Forked from amotmot/WAHH_Task_Checklist.md
Last active April 21, 2025 11:01
Show Gist options
  • Save jhaddix/6b777fb004768b388fefadf9175982ab to your computer and use it in GitHub Desktop.
Save jhaddix/6b777fb004768b388fefadf9175982ab to your computer and use it in GitHub Desktop.
Fast Simple Appsec Testing Checklist

Fast Testing Checklist

A combination of my own methodology and the Web Application Hacker's Handbook Task checklist, as a Github-Flavored Markdown file

Contents

Task Checklist

App Recon and analysis

  • Map visible content
  • Discover hidden & default content
  • Test for debug parameters
  • Identify data entry points
  • Identify the technologies used
  • Research existing vulnerabilitties in technology
  • Gather wordlists for specific techniology (Assetnote ones are excellent)
  • Map the attack surface (Spider)
  • Identify all javascript files for later analysis

Test handling of access

Authentication

  • Test password quality rules
  • Test for username enumeration
  • Test resilience to password guessing
  • Test any account recovery function
  • Test any "remember me" function
  • Test any impersonation function
  • Test username uniqueness
  • Check for unsafe distribution of credentials
  • Test for fail-open conditions
  • Test any multi-stage mechanisms

Session handling

  • Test tokens for meaning
  • Test tokens for predictability
  • Check for insecure transmission of tokens
  • Check for disclosure of tokens in logs
  • Check mapping of tokens to sessions
  • Check session termination
  • Check for session fixation
  • Check for cross-site request forgery
  • Check cookie scope

Access controls

  • Understand the access control requirements
  • Test effectiveness of controls, using multiple accounts if possible
  • Test for insecure access control methods (request parameters, Referer header, etc)

Test handling of input

  • Fuzz all request parameters
  • Test for SQL injection
  • Identify all reflected data
  • Test for reflected XSS
  • Test for HTTP header injection
  • Test for arbitrary redirection
  • Test for stored attacks
  • Test for OS command injection
  • Test for path traversal
  • Test for script injection
  • Test for file inclusion
  • Test for SMTP injection
  • Test for native software flaws (buffer overflow, integer bugs, format strings)
  • Test for SOAP injection
  • Test for LDAP injection
  • Test for XPath injection
  • Test for SSRF and HTTP Redirrects in all redirecting parameters

Test application logic

  • Identify the logic attack surface
  • Test transmission of data via the client
  • Test for reliance on client-side input validation
  • Test any thick-client components (Java, ActiveX, Flash)
  • Test multi-stage processes for logic flaws
  • Test handling of incomplete input
  • Test trust boundaries
  • Test transaction logic

Assess application hosting

  • Test segregation in shared infrastructures
  • Test segregation between ASP-hosted applications
  • Test for web server vulnerabilities
  • Default credentials
  • Default content
  • Dangerous HTTP methods
  • Proxy functionality
  • Virtual hosting mis-configuration
  • Bugs in web server software

Miscellaneous tests

  • Check for DOM-based attacks
  • Check for frame injection
  • Check for local privacy vulnerabilities
  • Persistent cookies
  • Caching
  • Sensitive data in URL parameters
  • Forms with autocomplete enabled
  • Follow up any information leakage
  • Check for weak SSL ciphers
@khanjanny
Copy link

rNnTRbt=1 x=d'">

onjrlW

@khanjanny
Copy link

rNnTRbt=1 x=d'">

lYrBYf

@khanjanny
Copy link

rNnTRbt=1 x=d'">

6PSBN0

@khanjanny
Copy link

rNnTRbt=1 x=d'">

pYrXqd

@khanjanny
Copy link

rNnTRbt=1 x=d'">

zPHzFD

@khanjanny
Copy link

rNnTRbt=1 x=d'">

kpKZ1U

@khanjanny
Copy link

rNnTRbt=1 x=d'">

Pp6hGi

@khanjanny
Copy link

rNnTRbt=1 x=d'">

qrXAZU

@khanjanny
Copy link

rNnTRbt=1 x=d'">

9KgEsL

@khanjanny
Copy link

rNnTRbt=1 x=d'">

lxXBTj

@khanjanny
Copy link

rNnTRbt=1 x=d'">

3sp3UK

@khanjanny
Copy link

rNnTRbt=1 x=d'">

6uazgR

@khanjanny
Copy link

rNnTRbt=1 x=d'">

0FQUjv

@khanjanny
Copy link

rNnTRbt=1 x=d'">

hk446J

@khanjanny
Copy link

rNnTRbt=1 x=d'">

ErfVkl

@khanjanny
Copy link

rNnTRbt=1 x=d'">

J6LE1x

@khanjanny
Copy link

rNnTRbt=1 x=d'">

ByCx9A

@khanjanny
Copy link

rNnTRbt=1 x=d'">

yBkXB5

@khanjanny
Copy link

rNnTRbt=1 x=d'">

LDtvx3

@T3chnocr4t
Copy link

thanks this is amazing checklist.

@DanielBrown173
Copy link

DanielBrown173 commented Apr 9, 2025

This checklist is a great resource for fast and thorough web application testing! It covers essential areas like reconnaissance, access handling, input handling, application logic, hosting assessment, and miscellaneous tests. It combines solid methodologies for security testing, ensuring no vulnerability goes unnoticed. Following this structured approach will help identify and mitigate risks efficiently. I was stuck on a case study, but Academized’s write my case study service saved me from falling behind. They provided a clear analysis with well-thought-out recommendations. For anyone struggling with their case study, visit https://academized.com/write-my-case-study. Their expert writers are skilled in producing insightful case studies that meet academic standards.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment