Checklist

Checklist #

Reconnaisance (Information Gathering) #

Injection #

Broken Authentication and Session Management #

Sensitive Data Exposure #

Improper Cryptography Usage #

Improper Authorization (Broken Access Control) #

Security Misconfiguration #

Insecure Communication #

Poor Code Quality #

Using Components with known vulnerabilities #

Insufficient logging and monitoring #

Miscellaneous #

  • Application Debuggable
  • Analyze the Dump File
  • Business Logic (Application Specific)
    • Bypassing license/extending lifetime of trial software via register manipulation
    • Payment Manipulation
  • String based analysis
  • Server-Side attacks
    • SSRF
    • Local File Inclusion (LFI)
    • Remote File Inclusion (RFI)
    • Denial Of Service attack (DOS)