Methodology
For a huge list of things to test check out the OWASP Web Security Testing Guide (WSTG)
The process outlined here does not cover nearly half of what is covered in the WSTG; however, this is a good process to start with. The steps do not need to be performed in the order outlined here; however, I think this is a pretty good flow for me.
Checklist
Check common file extensions:
php, html, asp, aspx, bak, tmp, txt
Page brute forcing
after identifying the extension(s) used, brute force for specific pages in the discovered directories
Spider
Common files
robots.txt
security.txt
sitemap.xml
crossdomain.xml
clientaccesspolicy.xml
SSL Certificate
Looking for domains, IPs, emails, names
Find hidden parameters
Brute force parameters
Parameters can be in the URL, cookies, body of a post request
SQLi
Directory Traversal
File Inclusion
Locate entry points that accept user input
This is where things can get really complicated as there are a lot of ways user input can be vulnerable.
Check for PUT and MOVE capability
Check for WebDav
Check for backup files
Download all JS files
Look for secrets in the JS files
Last updated
Was this helpful?