eWPTXv3 - Notes
GitHubPortfolioTwitter/X MediumCont@ctHome
  • 📝eWPTXv3
    • Web Application Penetration Testing Methodology
      • 1.1 Introduction to Web App Security Testing
        • 1.1.1 Web Application
        • 1.1.2 Web App Architecture
        • 1.1.3 HTTP/HTTPS
      • 1.2 Web App Pentesting Methodology
    • Web Application Reconnaissance
      • 2.1 Information Gathering
        • 2.1.1 DNS Recon
          • 2.1.1.1 DNS Zone Transfer
          • 2.1.1.2 Subdomain Enumeration
        • 2.1.2 WAF Recon
      • 2.2 Passive Crawling & Spidering
      • 2.3 Web Server Fingerprinting
        • 2.3.1 File & Directory Brute-Force
      • 2.4 Web Proxies
        • 2.4.1 Burp Suite
        • 2.4.2 OWASP ZAP
    • Authentication Attacks
      • 6.1 HTTP Attacks
        • 6.1.1 HTTP Method Tampering
        • 6.1.2 Attacking HTTP Authentication
      • 6.2 Session Attacks
        • 6.2.1 Session Hijacking
        • 6.2.2 Session Fixation
        • 6.2.3 Session Hijacking via Cookie Tampering
      • 6.3 JWT Attacks
      • 6.4 CSRF
    • Injection Vulnerabilities
      • 4.1 Command Injection
      • 4.2 Cross-Site Scripting (XSS)
        • 4.2.1 XSS Anatomy
        • 4.2.2 Reflected XSS
        • 4.2.3 Stored XSS
        • 4.2.4 DOM-Based XSS
        • 4.2.5 Identifying & Exploiting XSS with XSSer
      • 4.3 ​SQL Injection (SQLi)
        • 4.3.1 DB & SQL Introduction
        • 4.3.2 SQL Injection (SQLi)
        • 4.3.3 In-Band SQLi
        • 4.3.4 Blind SQLi
        • 4.3.5 NoSQL
        • 4.3.6 SQLMap
        • 4.3.7 Mitigation Strategies
    • API Penetration Testing
      • 5.1 API Testing
    • Server-Side Attacks
      • 6.1 Server-side request forgery (SSRF)
      • 6.2 Deserialization
      • 6.3 ​File & Resource Attacks
        • 6.1 File Upload Vulnerability
        • 6.2 Directory Traversal
        • 6.3 File Inclusion (LFI and RFI)
          • 6.3.1 Local File Inclusion (LFI)
          • 6.3.2 Remote File Inclusion (RFI)
        • 6.4 CMS Pentesting
          • 6.4.1 Wordpress, Drupal & Magento
    • Filter Evasion & WAF Bypass
      • 7.1 Obfuscating attacks using encodings
    • 📄Report
      • How to write a PT Report
  • 🛣️RoadMap / Exam Preparation
  • 📔eWPTX Cheat Sheet
Powered by GitBook
On this page
  • Common Methodology
  • Penetration Testing Execution Standard (PTES)
  • OWASP - Web Security Testing Guide (WSTG)
  • OWASP - TOP 10
  1. eWPTXv3
  2. Web Application Penetration Testing Methodology

1.2 Web App Pentesting Methodology

Common Methodology

A methodology ensures that penetration tests are performed consistently across different web applications and projects, providing standardized procedures and techniques on all necessary areas.

The more common phases are:

  1. Pre-engagement:

    • Define the scope of the test: Identify the target web application, its components, and any specific areas or functionalities to be tested.

    • Obtain necessary permissions: Ensure you have explicit authorization from the organization or individual responsible for the web application.

    • Gather information: Collect information about the web application, including its technologies, architecture, and potential entry points.

  2. Reconnaissance:

    • Passive information gathering: Use search engines, social media, and publicly available information to gather details about the target organization, its employees, and its infrastructure.

    • Active information gathering: Utilize tools like Nmap, Shodan, or automated web scanners to discover open ports, services, and web application components.

  3. Vulnerability Analysis:

    • Manual inspection: Review the source code, configuration files, and any documentation available to identify potential vulnerabilities.

    • Automated scanning: Use vulnerability scanners like Burp Suite, OWASP ZAP, or Nessus to identify common security flaws such as injection flaws, broken authentication, and session management issues.

    • Fuzzing: Employ fuzzing techniques to input unexpected or malformed data to discover vulnerabilities like buffer overflows or input validation issues.

  4. Exploitation:

    • Exploit identified vulnerabilities: Use manual or automated techniques to exploit the discovered vulnerabilities, gaining unauthorized access or control over the web application.

    • Attempt privilege escalation: If initial access is limited, attempt to escalate privileges to gain further access to sensitive data or functionality.

    • Maintain persistence: Establish backdoors or maintain access to the web application to ensure continued exploitation even after the testing period ends.

  5. Post-exploitation:

    • Data extraction: Retrieve sensitive information, such as user credentials, personal data, or proprietary information.

    • Cover tracks: Erase evidence of the penetration test to avoid detection and maintain the confidentiality of the testing process.

    • Documentation: Record all findings, including the vulnerabilities discovered, the exploitation techniques used, and recommendations for remediation.

  6. Reporting:

    • Compile a comprehensive report detailing the findings of the penetration test, including an executive summary, technical details of vulnerabilities, risk ratings, and recommendations for remediation.

    • Prioritize vulnerabilities based on severity and potential impact on the organization's assets and operations.

    • Present the findings to the stakeholders, including technical teams responsible for maintaining the web application and decision-makers responsible for allocating resources for remediation efforts.

  7. Follow-up:

    • Collaborate with the organization's teams to address and remediate the identified vulnerabilities.

    • Conduct re-testing to verify the effectiveness of remediation efforts and ensure that previously identified vulnerabilities have been adequately addressed.

    • Provide ongoing support and guidance to improve the organization's security posture and mitigate future risks.

Penetration Testing Execution Standard (PTES)

OWASP - Web Security Testing Guide (WSTG)

The WSTG is a comprehensive guide to testing the security of web applications and web services. Created by the collaborative efforts of cybersecurity professionals and dedicated volunteers, the WSTG provides a framework of best practices used by penetration testers and organizations all over the world.

OWASP - TOP 10

Companies should adopt this document and start the process of ensuring that their web applications minimize these risks. Using the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces more secure code.

Previous1.1.3 HTTP/HTTPSNextWeb Application Reconnaissance

Last updated 1 month ago

stands for the Penetration Testing Execution Standard, a comprehensive methodology that encompasses all facets of security assessments, including thorough examination of web applications. It offers a systematic framework starting from pre-engagement activities to post-assessment reporting and follow-up, rendering it ideal for in-depth evaluations.

The Project produces the premier cybersecurity testing resource for web application developers and security professionals.

The is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

📝
PTES
Web Security Testing Guide (WSTG)
OWASP Top 10
The Penetration Testing Execution Standard (PTES) Automation FrameworkGitHub
OWASP Web Security Testing Guide | OWASP Foundation
Logo
GitHub - OWASP/wstg: The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.GitHub
OWASP Top Ten Web Application Security Risks | OWASP
Logo
Logo
Logo