All Projects → 0xRadi → Owasp Web Checklist

0xRadi / Owasp Web Checklist

OWASP Web Application Security Testing Checklist

Labels

Projects that are alternatives of or similar to Owasp Web Checklist

appsec awareness training
Application Security Awareness Training
Stars: ✭ 17 (-96.87%)
Mutual labels:  owasp
Vbscan
OWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-45.67%)
Mutual labels:  owasp
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+1054.7%)
Mutual labels:  owasp
Nosqlinjection wordlists
This repository contains payload to test NoSQL Injections
Stars: ✭ 269 (-50.46%)
Mutual labels:  owasp
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+545.12%)
Mutual labels:  owasp
Maryam
Maryam: Open-source Intelligence(OSINT) Framework
Stars: ✭ 371 (-31.68%)
Mutual labels:  owasp
mobile-security-review
Security review guidelines for mobile projects
Stars: ✭ 9 (-98.34%)
Mutual labels:  owasp
Owasp Vwad
The OWASP Vulnerable Web Applications Directory project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
Stars: ✭ 487 (-10.31%)
Mutual labels:  owasp
Cheatsheetseries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Stars: ✭ 19,302 (+3454.7%)
Mutual labels:  owasp
Dvna
Damn Vulnerable NodeJS Application
Stars: ✭ 463 (-14.73%)
Mutual labels:  owasp
Iotgoat
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
Stars: ✭ 275 (-49.36%)
Mutual labels:  owasp
Cdk Constructs
A collection of higher-level aws cdk constructs: slack-approval-workflow, #slack & msteams notifications, chatops, blue-green-container-deployment, codecommit-backup, OWASP dependency-check, contentful-webhook, github-webhook, stripe-webhook, static-website, pull-request-check, pull-request-approval-rule, codepipeline-merge-action, codepipeline-check-parameter-action...
Stars: ✭ 282 (-48.07%)
Mutual labels:  owasp
Www Community
OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.
Stars: ✭ 409 (-24.68%)
Mutual labels:  owasp
Dvws
OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.
Stars: ✭ 267 (-50.83%)
Mutual labels:  owasp
Awesome Appsec
A curated list of resources for learning about application security
Stars: ✭ 4,761 (+776.8%)
Mutual labels:  owasp
cyclonedx-gomod
Creates CycloneDX Software Bill of Materials (SBOM) from Go modules
Stars: ✭ 27 (-95.03%)
Mutual labels:  owasp
Dependency Check Sonar Plugin
Integrates Dependency-Check reports into SonarQube
Stars: ✭ 332 (-38.86%)
Mutual labels:  owasp
Zsc
OWASP ZSC - Shellcode/Obfuscate Code Generator
Stars: ✭ 536 (-1.29%)
Mutual labels:  owasp
Zap Extensions
OWASP ZAP Add-ons
Stars: ✭ 486 (-10.5%)
Mutual labels:  owasp
Glue
Application Security Automation
Stars: ✭ 412 (-24.13%)
Mutual labels:  owasp

OWASP Web Application Security Testing Checklist

Table of Contents


Information Gathering

  • [ ] Manually explore the site
  • [ ] Spider/crawl for missed or hidden content
  • [ ] Check for files that expose content, such as robots.txt, sitemap.xml, .DS_Store
  • [ ] Check the caches of major search engines for publicly accessible sites
  • [ ] Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)
  • [ ] Perform Web Application Fingerprinting
  • [ ] Identify technologies used
  • [ ] Identify user roles
  • [ ] Identify application entry points
  • [ ] Identify client-side code
  • [ ] Identify multiple versions/channels (e.g. web, mobile web, mobile app, web services)
  • [ ] Identify co-hosted and related applications
  • [ ] Identify all hostnames and ports
  • [ ] Identify third-party hosted content

Configuration Management

  • [ ] Check for commonly used application and administrative URLs
  • [ ] Check for old, backup and unreferenced files
  • [ ] Check HTTP methods supported and Cross Site Tracing (XST)
  • [ ] Test file extensions handling
  • [ ] Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)
  • [ ] Test for policies (e.g. Flash, Silverlight, robots)
  • [ ] Test for non-production data in live environment, and vice-versa
  • [ ] Check for sensitive data in client-side code (e.g. API keys, credentials)

Secure Transmission

  • [ ] Check SSL Version, Algorithms, Key length
  • [ ] Check for Digital Certificate Validity (Duration, Signature and CN)
  • [ ] Check credentials only delivered over HTTPS
  • [ ] Check that the login form is delivered over HTTPS
  • [ ] Check session tokens only delivered over HTTPS
  • [ ] Check if HTTP Strict Transport Security (HSTS) in use

Authentication

  • [ ] Test for user enumeration
  • [ ] Test for authentication bypass
  • [ ] Test for bruteforce protection
  • [ ] Test password quality rules
  • [ ] Test remember me functionality
  • [ ] Test for autocomplete on password forms/input
  • [ ] Test password reset and/or recovery
  • [ ] Test password change process
  • [ ] Test CAPTCHA
  • [ ] Test multi factor authentication
  • [ ] Test for logout functionality presence
  • [ ] Test for cache management on HTTP (eg Pragma, Expires, Max-age)
  • [ ] Test for default logins
  • [ ] Test for user-accessible authentication history
  • [ ] Test for out-of channel notification of account lockouts and successful password changes
  • [ ] Test for consistent authentication across applications with shared authentication schema / SSO

Session Management

  • [ ] Establish how session management is handled in the application (eg, tokens in cookies, token in URL)
  • [ ] Check session tokens for cookie flags (httpOnly and secure)
  • [ ] Check session cookie scope (path and domain)
  • [ ] Check session cookie duration (expires and max-age)
  • [ ] Check session termination after a maximum lifetime
  • [ ] Check session termination after relative timeout
  • [ ] Check session termination after logout
  • [ ] Test to see if users can have multiple simultaneous sessions
  • [ ] Test session cookies for randomness
  • [ ] Confirm that new session tokens are issued on login, role change and logout
  • [ ] Test for consistent session management across applications with shared session management
  • [ ] Test for session puzzling
  • [ ] Test for CSRF and clickjacking

Authorization

  • [ ] Test for path traversal
  • [ ] Test for bypassing authorization schema
  • [ ] Test for vertical Access control problems (a.k.a. Privilege Escalation)
  • [ ] Test for horizontal Access control problems (between two users at the same privilege level)
  • [ ] Test for missing authorization

Data Validation

  • [ ] Test for Reflected Cross Site Scripting
  • [ ] Test for Stored Cross Site Scripting
  • [ ] Test for DOM based Cross Site Scripting
  • [ ] Test for Cross Site Flashing
  • [ ] Test for HTML Injection
  • [ ] Test for SQL Injection
  • [ ] Test for LDAP Injection
  • [ ] Test for ORM Injection
  • [ ] Test for XML Injection
  • [ ] Test for XXE Injection
  • [ ] Test for SSI Injection
  • [ ] Test for XPath Injection
  • [ ] Test for XQuery Injection
  • [ ] Test for IMAP/SMTP Injection
  • [ ] Test for Code Injection
  • [ ] Test for Expression Language Injection
  • [ ] Test for Command Injection
  • [ ] Test for Overflow (Stack, Heap and Integer)
  • [ ] Test for Format String
  • [ ] Test for incubated vulnerabilities
  • [ ] Test for HTTP Splitting/Smuggling
  • [ ] Test for HTTP Verb Tampering
  • [ ] Test for Open Redirection
  • [ ] Test for Local File Inclusion
  • [ ] Test for Remote File Inclusion
  • [ ] Compare client-side and server-side validation rules
  • [ ] Test for NoSQL injection
  • [ ] Test for HTTP parameter pollution
  • [ ] Test for auto-binding
  • [ ] Test for Mass Assignment
  • [ ] Test for NULL/Invalid Session Cookie

Denial of Service

  • [ ] Test for anti-automation
  • [ ] Test for account lockout
  • [ ] Test for HTTP protocol DoS
  • [ ] Test for SQL wildcard DoS

Business Logic

  • [ ] Test for feature misuse
  • [ ] Test for lack of non-repudiation
  • [ ] Test for trust relationships
  • [ ] Test for integrity of data
  • [ ] Test segregation of duties

Cryptography

  • [ ] Check if data which should be encrypted is not
  • [ ] Check for wrong algorithms usage depending on context
  • [ ] Check for weak algorithms usage
  • [ ] Check for proper use of salting
  • [ ] Check for randomness functions

Risky Functionality - File Uploads

  • [ ] Test that acceptable file types are whitelisted
  • [ ] Test that file size limits, upload frequency and total file counts are defined and are enforced
  • [ ] Test that file contents match the defined file type
  • [ ] Test that all file uploads have Anti-Virus scanning in-place.
  • [ ] Test that unsafe filenames are sanitised
  • [ ] Test that uploaded files are not directly accessible within the web root
  • [ ] Test that uploaded files are not served on the same hostname/port
  • [ ] Test that files and other media are integrated with the authentication and authorisation schemas

Risky Functionality - Card Payment

  • [ ] Test for known vulnerabilities and configuration issues on Web Server and Web Application
  • [ ] Test for default or guessable password
  • [ ] Test for non-production data in live environment, and vice-versa
  • [ ] Test for Injection vulnerabilities
  • [ ] Test for Buffer Overflows
  • [ ] Test for Insecure Cryptographic Storage
  • [ ] Test for Insufficient Transport Layer Protection
  • [ ] Test for Improper Error Handling
  • [ ] Test for all vulnerabilities with a CVSS v2 score > 4.0
  • [ ] Test for Authentication and Authorization issues
  • [ ] Test for CSRF

HTML 5

  • [ ] Test Web Messaging
  • [ ] Test for Web Storage SQL injection
  • [ ] Check CORS implementation
  • [ ] Check Offline Web Application

Source: OWASP

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].