JAN
Authentication
- Authentication Bypass: Verify if authentication mechanism implemented by your application can be bypassed.
 - Password Strength: Check whether the application implements strong password requirements.
 - Password field with auto complete enabled: Password fields in an application should have “Autocomplete=OFF” set.
 
Authorization
- Authorization Bypass: Verify if lower privileged user can access resources of higher privileged user.
 
Input Validation
- Cross site scripting: Test for cross site scripting vulnerability in all the fields that take user input and that are being reflected back on to the HTML code or JavaScript code.
 - SQL Injection: Test for SQLi vulnerability in all the fields that take user input and that are being sent to the database.
 - LDAP Injection: For applications that use LDAP, verify if input parameters are vulnerable to LDAP injection.
 - Cross site request Forgery: Test for CSRF vulnerability on all the form submissions and URLs (POST and GET requests) of the application.
 - Buffer Over flow: Check if any of the input parameters cause buffer overflow on the server or client.
 - Response Splitting: Identify input parameters that are being used in response headers and check if they are vulnerable to response splitting.
 
System Configuration
- Harmful HTTP Methods Enabled: Check if harmful HTTP methods like PUT, DELETE, TRACE are enabled on the server. It is good to disable OPTIONS method also.
 - Directory Listing enabled on the server: Check if the application server allows listing of contents of a folder in application server.
 
Information Leakage
- Web pages containing sensitive pages being cached: Verify if the application caches pages containing sensitive data.
 - Un-encrypted sensitive data: Sensitive data need to be encrypted. It should neither be stored in plain text nor it should be stored in a encoded format.
 - Server Platform Information Leak: Check if server platform information is leaked in Response headers or error messages or default server pages.
 
Session Management
- Session Hijacking: Check if the application allows users to steal session cookies and use them from their machines.
 - Session Fixation: Verify if the application allows fixation of session cookie by users or attackers.
 - Predictable session cookies: Verify whether the session cookies random enough and could not be predicted by users.
 
No comments:
Post a Comment