SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
BWPT - BRISK WEBAPP PENETRATION TESTER
Brisk Infosec Solutions LLP Page 1
BRISK WEBAPP PENTEST EXPERT - BWPT
COURSE DESCRIPTION:
This course examines in depth the vulnerabilities, threats, and mitigations described in the OWASP Testing Guide
v4.0. Upon completion of this class, participants will be able to identify and mitigate the greatest threats that web
application developers face, including: Injection, Broken Authentication and Session Management, Cross-Site
Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing
Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities,
Buffer overflow vulnerabilities and Unvalidated Redirects and Forwards. The course includes Knowledge Checks,
Module Summaries, and links to additional online resources.
This class room training will not encourage Automated vulnerability scanning tools to find all well known bugs in
application. BWPT is about to educate individual attendees to play around with Burp Suite and other manual
security test tools to identify all known, unknown and Hidden vulnerability in web application. We want make you
to become knowledgeable Web penetration tester to secure online application.
COURSE OBJECTIVES:
After completing this course, you will be able to:
 know more compliance and penetration test process and checklists
 Identify the most significant and prevalent security flaws that impact web applications.
 Explain mitigation techniques to remediate common security flaws in your web application.
 Understand OWASP Testing Guide 4.0 vulnerabilities and testing techniques
 Handle web app pentest project
 Cover ISO 27001, PCI:DSS etc.. Pentest requirements
DURATION - 48 HOURS
FEES - INR 35000/-
BWPT - BRISK WEBAPP PENETRATION TESTER
Brisk Infosec Solutions LLP Page 2
1 INTRODUCTION AND OBJECTIVES OF WEB APP SECURITY TESTING
4.1.1 Testing Checklist
2 INFORMATION GATHERING
2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001)
2.2 Fingerprint Web Server (OTG-INFO-002)
2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003)
2.4 Enumerate Applications on Webserver (OTG-INFO-004)
2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005)
2.6 Identify application entry points (OTG-INFO-006)
2.7 Map execution paths through application (OTG-INFO-007)
2.8 Fingerprint Web Application Framework (OTG-INFO-008)
2.9 Fingerprint Web Application (OTG-INFO-009)
2.10 Map Application Architecture (OTG-INFO-010)
3 CONFIGURATION AND DEPLOYMENT MANAGEMENT TESTING
3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001)
3.2 Test Application Platform Configuration (OTG-CONFIG-002)
3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003)
3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004)
3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005)
3.6 Test HTTP Methods (OTG-CONFIG-006)
3.7 Test HTTP Strict Transport Security (OTG-CONFIG-007)
3.8 Test RIA cross domain policy (OTG-CONFIG-008)
4 IDENTITY MANAGEMENT TESTING
4.1 Test Role Definitions (OTG-IDENT-001)
4.2 Test User Registration Process (OTG-IDENT-002)
4.3 Test Account Provisioning Process (OTG-IDENT-003)
4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004)
4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005)
5 AUTHENTICATION TESTING
5.1 Testing for Credentials Transported over an Encrypted Channel (OTG-AUTHN-001)
5.2 Testing for default credentials (OTG-AUTHN-002)
5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003)
5.4 Testing for bypassing authentication schema (OTG-AUTHN-004)
5.5 Test remember password functionality (OTG-AUTHN-005)
5.6 Testing for Browser cache weakness (OTG-AUTHN-006)
5.7 Testing for Weak password policy (OTG-AUTHN-007)
5.8 Testing for Weak security question/answer (OTG-AUTHN-008)
5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009)
5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)
BWPT - BRISK WEBAPP PENETRATION TESTER
Brisk Infosec Solutions LLP Page 3
6 AUTHORIZATION TESTING
6.1 Testing Directory traversal/file include (OTG-AUTHZ-001)
6.2 Testing for bypassing authorization schema (OTG-AUTHZ-002)
6.3 Testing for Privilege Escalation (OTG-AUTHZ-003)
6.4 Testing for Insecure Direct Object References (OTG-AUTHZ-004)
7 SESSION MANAGEMENT TESTING
7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001)
7.2 Testing for Cookies attributes (OTG-SESS-002)
7.3 Testing for Session Fixation (OTG-SESS-003)
7.4 Testing for Exposed Session Variables (OTG-SESS-004)
7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005)
7.6 Testing for logout functionality (OTG-SESS-006)
7.7 Test Session Timeout (OTG-SESS-007)
7.8 Testing for Session puzzling (OTG-SESS-008)
8 INPUT VALIDATION TESTING
8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001)
8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002)
8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003)
8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004)
8.5 Testing for SQL Injection (OTG-INPVAL-005)
8.5.1 Oracle Testing
8.5.2 MySQL Testing
8.5.3 SQL Server Testing
8.5.4 Testing PostgreSQL (from OWASP BSP)
8.5.5 MS Access Testing
8.5.6 Testing for NoSQL injection
8.6 Testing for LDAP Injection (OTG-INPVAL-006)
8.7 Testing for ORM Injection (OTG-INPVAL-007)
8.8 Testing for XML Injection (OTG-INPVAL-008)
8.9 Testing for SSI Injection (OTG-INPVAL-009)
8.10 Testing for XPath Injection (OTG-INPVAL-010)
8.11 IMAP/SMTP Injection (OTG-INPVAL-011)
8.12 Testing for Code Injection (OTG-INPVAL-012)
8.12.1 Testing for Local File Inclusion
8.12.2 Testing for Remote File Inclusion
8.13 Testing for Command Injection (OTG-INPVAL-013)
8.14 Testing for Buffer overflow (OTG-INPVAL-014)
8.14.1 Testing for Heap overflow
8.14.2 Testing for Stack overflow
8.14.3 Testing for Format string
8.15 Testing for incubated vulnerabilities (OTG-INPVAL-015)
8.16 Testing for HTTP Splitting/Smuggling (OTG-INPVAL-016)
BWPT - BRISK WEBAPP PENETRATION TESTER
Brisk Infosec Solutions LLP Page 4
9 TESTING FOR ERROR HANDLING
9.1 Analysis of Error Codes (OTG-ERR-001)
9.2 Analysis of Stack Traces (OTG-ERR-002)
10 TESTING FOR WEAK CRYPTOGRAPHY
10.1 Testing for Weak SSL/TLS Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-001)
10.2 Testing for Padding Oracle (OTG-CRYPST-002)
10.3 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003)
11 BUSINESS LOGIC TESTING
11.1 Test Business Logic Data Validation (OTG-BUSLOGIC-001)
11.2 Test Ability to Forge Requests (OTG-BUSLOGIC-002)
11.3 Test Integrity Checks (OTG-BUSLOGIC-003)
11.4 Test for Process Timing (OTG-BUSLOGIC-004)
11.5 Test Number of Times a Function Can be Used Limits (OTG-BUSLOGIC-005)
11.6 Testing for the Circumvention of Work Flows (OTG-BUSLOGIC-006)
11.7 Test Defenses Against Application Mis-use (OTG-BUSLOGIC-007)
11.8 Test Upload of Unexpected File Types (OTG-BUSLOGIC-008)
11.9 Test Upload of Malicious Files (OTG-BUSLOGIC-009)
4.12 CLIENT SIDE TESTING
12.1 Testing for DOM based Cross Site Scripting (OTG-CLIENT-001)
12.2 Testing for JavaScript Execution (OTG-CLIENT-002)
12.3 Testing for HTML Injection (OTG-CLIENT-003)
12.4 Testing for Client Side URL Redirect (OTG-CLIENT-004)
12.5 Testing for CSS Injection (OTG-CLIENT-005)
12.6 Testing for Client Side Resource Manipulation (OTG-CLIENT-006)
12.7 Test Cross Origin Resource Sharing (OTG-CLIENT-007)
12.8 Testing for Cross Site Flashing (OTG-CLIENT-008)
12.9 Testing for Clickjacking (OTG-CLIENT-009)
12.10 Testing WebSockets (OTG-CLIENT-010)
12.11 Test Web Messaging (OTG-CLIENT-011)
12.12 Test Local Storage (OTG-CLIENT-012)
13. REPORTING

Más contenido relacionado

Similar a Brisk WebApp penetration tester

OWASP Testing Guide 4.0
OWASP Testing Guide 4.0OWASP Testing Guide 4.0
OWASP Testing Guide 4.0cassandranna
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4Suresh Kumar
 
Secure SDLC for Software
Secure SDLC for Software Secure SDLC for Software
Secure SDLC for Software Shreeraj Shah
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxnmk42194
 
Owasp Eu Summit 2008 Owasp Testing Guide V3
Owasp Eu Summit 2008 Owasp Testing Guide V3Owasp Eu Summit 2008 Owasp Testing Guide V3
Owasp Eu Summit 2008 Owasp Testing Guide V3Matteo Meucci
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxcgt38842
 
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2ssuser18349f1
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxjohnpragasam1
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxazida3
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and BestPositive Hack Days
 
Better API Security With A SecDevOps Approach
Better API Security With A SecDevOps ApproachBetter API Security With A SecDevOps Approach
Better API Security With A SecDevOps ApproachNordic APIs
 
Better API Security with Automation
Better API Security with Automation Better API Security with Automation
Better API Security with Automation 42Crunch
 
[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래NAVER D2
 
Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019Balázs Tatár
 
High Availability by Design
High Availability by DesignHigh Availability by Design
High Availability by DesignDavid Prinzing
 
JAX 2017 - Sicher in die Cloud mit Angular und Spring Boot
JAX 2017 - Sicher in die Cloud mit Angular und Spring BootJAX 2017 - Sicher in die Cloud mit Angular und Spring Boot
JAX 2017 - Sicher in die Cloud mit Angular und Spring BootAndreas Falk
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben Rodriguez
 
APIGATEWAY in Microservices
APIGATEWAY in MicroservicesAPIGATEWAY in Microservices
APIGATEWAY in MicroservicesIRJET Journal
 

Similar a Brisk WebApp penetration tester (20)

OWASP Testing Guide 4.0
OWASP Testing Guide 4.0OWASP Testing Guide 4.0
OWASP Testing Guide 4.0
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4
 
Secure SDLC for Software
Secure SDLC for Software Secure SDLC for Software
Secure SDLC for Software
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
 
OWASP Testing Guide v3
OWASP Testing Guide v3OWASP Testing Guide v3
OWASP Testing Guide v3
 
Owasp Eu Summit 2008 Owasp Testing Guide V3
Owasp Eu Summit 2008 Owasp Testing Guide V3Owasp Eu Summit 2008 Owasp Testing Guide V3
Owasp Eu Summit 2008 Owasp Testing Guide V3
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
SAP (In)Security: New and Best
SAP (In)Security: New and BestSAP (In)Security: New and Best
SAP (In)Security: New and Best
 
Better API Security With A SecDevOps Approach
Better API Security With A SecDevOps ApproachBetter API Security With A SecDevOps Approach
Better API Security With A SecDevOps Approach
 
Better API Security with Automation
Better API Security with Automation Better API Security with Automation
Better API Security with Automation
 
[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래[1C2]webrtc 개발, 현재와 미래
[1C2]webrtc 개발, 현재와 미래
 
Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019Software Development Weaknesses - SecOSdays Sofia, 2019
Software Development Weaknesses - SecOSdays Sofia, 2019
 
OWASP an Introduction
OWASP an Introduction OWASP an Introduction
OWASP an Introduction
 
High Availability by Design
High Availability by DesignHigh Availability by Design
High Availability by Design
 
JAX 2017 - Sicher in die Cloud mit Angular und Spring Boot
JAX 2017 - Sicher in die Cloud mit Angular und Spring BootJAX 2017 - Sicher in die Cloud mit Angular und Spring Boot
JAX 2017 - Sicher in die Cloud mit Angular und Spring Boot
 
Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben from Spirent talks at the SDN World Congress about the importance of and...
Iben from Spirent talks at the SDN World Congress about the importance of and...
 
APIGATEWAY in Microservices
APIGATEWAY in MicroservicesAPIGATEWAY in Microservices
APIGATEWAY in Microservices
 

Brisk WebApp penetration tester

  • 1. BWPT - BRISK WEBAPP PENETRATION TESTER Brisk Infosec Solutions LLP Page 1 BRISK WEBAPP PENTEST EXPERT - BWPT COURSE DESCRIPTION: This course examines in depth the vulnerabilities, threats, and mitigations described in the OWASP Testing Guide v4.0. Upon completion of this class, participants will be able to identify and mitigate the greatest threats that web application developers face, including: Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Buffer overflow vulnerabilities and Unvalidated Redirects and Forwards. The course includes Knowledge Checks, Module Summaries, and links to additional online resources. This class room training will not encourage Automated vulnerability scanning tools to find all well known bugs in application. BWPT is about to educate individual attendees to play around with Burp Suite and other manual security test tools to identify all known, unknown and Hidden vulnerability in web application. We want make you to become knowledgeable Web penetration tester to secure online application. COURSE OBJECTIVES: After completing this course, you will be able to:  know more compliance and penetration test process and checklists  Identify the most significant and prevalent security flaws that impact web applications.  Explain mitigation techniques to remediate common security flaws in your web application.  Understand OWASP Testing Guide 4.0 vulnerabilities and testing techniques  Handle web app pentest project  Cover ISO 27001, PCI:DSS etc.. Pentest requirements DURATION - 48 HOURS FEES - INR 35000/-
  • 2. BWPT - BRISK WEBAPP PENETRATION TESTER Brisk Infosec Solutions LLP Page 2 1 INTRODUCTION AND OBJECTIVES OF WEB APP SECURITY TESTING 4.1.1 Testing Checklist 2 INFORMATION GATHERING 2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) 2.2 Fingerprint Web Server (OTG-INFO-002) 2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) 2.4 Enumerate Applications on Webserver (OTG-INFO-004) 2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) 2.6 Identify application entry points (OTG-INFO-006) 2.7 Map execution paths through application (OTG-INFO-007) 2.8 Fingerprint Web Application Framework (OTG-INFO-008) 2.9 Fingerprint Web Application (OTG-INFO-009) 2.10 Map Application Architecture (OTG-INFO-010) 3 CONFIGURATION AND DEPLOYMENT MANAGEMENT TESTING 3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) 3.2 Test Application Platform Configuration (OTG-CONFIG-002) 3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) 3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) 3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) 3.6 Test HTTP Methods (OTG-CONFIG-006) 3.7 Test HTTP Strict Transport Security (OTG-CONFIG-007) 3.8 Test RIA cross domain policy (OTG-CONFIG-008) 4 IDENTITY MANAGEMENT TESTING 4.1 Test Role Definitions (OTG-IDENT-001) 4.2 Test User Registration Process (OTG-IDENT-002) 4.3 Test Account Provisioning Process (OTG-IDENT-003) 4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) 4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005) 5 AUTHENTICATION TESTING 5.1 Testing for Credentials Transported over an Encrypted Channel (OTG-AUTHN-001) 5.2 Testing for default credentials (OTG-AUTHN-002) 5.3 Testing for Weak lock out mechanism (OTG-AUTHN-003) 5.4 Testing for bypassing authentication schema (OTG-AUTHN-004) 5.5 Test remember password functionality (OTG-AUTHN-005) 5.6 Testing for Browser cache weakness (OTG-AUTHN-006) 5.7 Testing for Weak password policy (OTG-AUTHN-007) 5.8 Testing for Weak security question/answer (OTG-AUTHN-008) 5.9 Testing for weak password change or reset functionalities (OTG-AUTHN-009) 5.10 Testing for Weaker authentication in alternative channel (OTG-AUTHN-010)
  • 3. BWPT - BRISK WEBAPP PENETRATION TESTER Brisk Infosec Solutions LLP Page 3 6 AUTHORIZATION TESTING 6.1 Testing Directory traversal/file include (OTG-AUTHZ-001) 6.2 Testing for bypassing authorization schema (OTG-AUTHZ-002) 6.3 Testing for Privilege Escalation (OTG-AUTHZ-003) 6.4 Testing for Insecure Direct Object References (OTG-AUTHZ-004) 7 SESSION MANAGEMENT TESTING 7.1 Testing for Bypassing Session Management Schema (OTG-SESS-001) 7.2 Testing for Cookies attributes (OTG-SESS-002) 7.3 Testing for Session Fixation (OTG-SESS-003) 7.4 Testing for Exposed Session Variables (OTG-SESS-004) 7.5 Testing for Cross Site Request Forgery (CSRF) (OTG-SESS-005) 7.6 Testing for logout functionality (OTG-SESS-006) 7.7 Test Session Timeout (OTG-SESS-007) 7.8 Testing for Session puzzling (OTG-SESS-008) 8 INPUT VALIDATION TESTING 8.1 Testing for Reflected Cross Site Scripting (OTG-INPVAL-001) 8.2 Testing for Stored Cross Site Scripting (OTG-INPVAL-002) 8.3 Testing for HTTP Verb Tampering (OTG-INPVAL-003) 8.4 Testing for HTTP Parameter pollution (OTG-INPVAL-004) 8.5 Testing for SQL Injection (OTG-INPVAL-005) 8.5.1 Oracle Testing 8.5.2 MySQL Testing 8.5.3 SQL Server Testing 8.5.4 Testing PostgreSQL (from OWASP BSP) 8.5.5 MS Access Testing 8.5.6 Testing for NoSQL injection 8.6 Testing for LDAP Injection (OTG-INPVAL-006) 8.7 Testing for ORM Injection (OTG-INPVAL-007) 8.8 Testing for XML Injection (OTG-INPVAL-008) 8.9 Testing for SSI Injection (OTG-INPVAL-009) 8.10 Testing for XPath Injection (OTG-INPVAL-010) 8.11 IMAP/SMTP Injection (OTG-INPVAL-011) 8.12 Testing for Code Injection (OTG-INPVAL-012) 8.12.1 Testing for Local File Inclusion 8.12.2 Testing for Remote File Inclusion 8.13 Testing for Command Injection (OTG-INPVAL-013) 8.14 Testing for Buffer overflow (OTG-INPVAL-014) 8.14.1 Testing for Heap overflow 8.14.2 Testing for Stack overflow 8.14.3 Testing for Format string 8.15 Testing for incubated vulnerabilities (OTG-INPVAL-015) 8.16 Testing for HTTP Splitting/Smuggling (OTG-INPVAL-016)
  • 4. BWPT - BRISK WEBAPP PENETRATION TESTER Brisk Infosec Solutions LLP Page 4 9 TESTING FOR ERROR HANDLING 9.1 Analysis of Error Codes (OTG-ERR-001) 9.2 Analysis of Stack Traces (OTG-ERR-002) 10 TESTING FOR WEAK CRYPTOGRAPHY 10.1 Testing for Weak SSL/TLS Ciphers, Insufficient Transport Layer Protection (OTG-CRYPST-001) 10.2 Testing for Padding Oracle (OTG-CRYPST-002) 10.3 Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003) 11 BUSINESS LOGIC TESTING 11.1 Test Business Logic Data Validation (OTG-BUSLOGIC-001) 11.2 Test Ability to Forge Requests (OTG-BUSLOGIC-002) 11.3 Test Integrity Checks (OTG-BUSLOGIC-003) 11.4 Test for Process Timing (OTG-BUSLOGIC-004) 11.5 Test Number of Times a Function Can be Used Limits (OTG-BUSLOGIC-005) 11.6 Testing for the Circumvention of Work Flows (OTG-BUSLOGIC-006) 11.7 Test Defenses Against Application Mis-use (OTG-BUSLOGIC-007) 11.8 Test Upload of Unexpected File Types (OTG-BUSLOGIC-008) 11.9 Test Upload of Malicious Files (OTG-BUSLOGIC-009) 4.12 CLIENT SIDE TESTING 12.1 Testing for DOM based Cross Site Scripting (OTG-CLIENT-001) 12.2 Testing for JavaScript Execution (OTG-CLIENT-002) 12.3 Testing for HTML Injection (OTG-CLIENT-003) 12.4 Testing for Client Side URL Redirect (OTG-CLIENT-004) 12.5 Testing for CSS Injection (OTG-CLIENT-005) 12.6 Testing for Client Side Resource Manipulation (OTG-CLIENT-006) 12.7 Test Cross Origin Resource Sharing (OTG-CLIENT-007) 12.8 Testing for Cross Site Flashing (OTG-CLIENT-008) 12.9 Testing for Clickjacking (OTG-CLIENT-009) 12.10 Testing WebSockets (OTG-CLIENT-010) 12.11 Test Web Messaging (OTG-CLIENT-011) 12.12 Test Local Storage (OTG-CLIENT-012) 13. REPORTING