-
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCyberSec Cheatsheet.txt
1919 lines (1527 loc) · 93.4 KB
/
CyberSec Cheatsheet.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Wildcard
Here’s a curated list of 100 topics to help you focus on finding vulnerabilities in wildcards (subdomains or generalized domains) in a structured way. These topics will help you dig deeper into web application vulnerabilities, specifically targeting wildcard domains:
________________
1-20: Subdomain Enumeration and Analysis
1. Subdomain enumeration with crt.sh and certificate transparency logs.
2. Automated subdomain discovery tools (Amass, Sublist3r, etc.).
3. Brute-forcing subdomains using wordlists.
4. Discovering wildcard DNS misconfigurations.
5. Identifying dead subdomains with httpx or similar tools.
6. Finding dangling DNS records (subdomain takeovers).
7. Investigating CNAME and external service bindings.
8. Discovering hidden subdomains via web archives (Wayback Machine).
9. Analyzing subdomain permutations and typosquats.
10. Checking for subdomains hosted on public cloud providers.
11. Enumerating wildcard subdomains with mass DNS tools.
12. Finding exposed staging, dev, and UAT environments.
13. Analyzing misconfigured subdomains redirecting to external sites.
14. Reverse IP lookup for wildcard domains.
15. Searching for hidden assets in subdomains (e.g., api.*).
16. Examining wildcard responses for directory traversal.
17. Identifying subdomains without HTTPS enforcement.
18. Locating vulnerable subdomains through site leaks (robots.txt, sitemap.xml).
19. Searching GitHub repositories for subdomain-specific secrets.
20. Finding wildcards in third-party JavaScript files.
________________
21-40: Application-Level Vulnerabilities
21. Cross-origin resource sharing (CORS) misconfigurations in subdomains.
22. Cross-site scripting (XSS) on subdomains with wildcard responses.
23. SQL injection in subdomain query parameters.
24. API key leaks via wildcard API subdomains.
25. Subdomain-wide session management issues.
26. Authentication bypass through subdomain misconfigurations.
27. Testing wildcard subdomains for insecure cookie attributes.
28. Privilege escalation between wildcard subdomains.
29. Open redirects in wildcard domains.
30. Insecure file uploads in subdomains.
31. Testing for NoSQL injections on wildcard APIs.
32. Directory indexing on wildcard domains.
33. Sensitive data exposure in wildcard domains (PII, credentials).
34. Excessive permissions on exposed API endpoints.
35. Rate-limiting bypass on subdomain APIs.
36. Misconfigured error handling revealing stack traces in subdomains.
37. Testing for SSTI (Server-Side Template Injection) in wildcard responses.
38. CSRF vulnerabilities on wildcard subdomains.
39. Checking for default credentials on wildcard services.
40. Testing for improper session termination across wildcard subdomains.
________________
41-60: Wildcard-Specific Infrastructure Weaknesses
41. Misconfigured WAF rules on wildcard subdomains.
42. CDN misconfigurations exposing internal services.
43. Analyzing reverse proxy vulnerabilities on wildcards.
44. Testing for HTTP request smuggling across wildcard subdomains.
45. Cache poisoning attacks on wildcard domains.
46. Discovering unprotected staging or testing environments in wildcards.
47. Testing for prototype pollution vulnerabilities on wildcards.
48. SSRF vulnerabilities in wildcard APIs.
49. Host header injection on wildcard domains.
50. Detecting JWT (JSON Web Token) misconfigurations in wildcard subdomains.
51. Insecure HTTP methods enabled in wildcard responses.
52. Identifying misconfigured Access-Control-Allow-Origin headers.
53. Analyzing exposed internal IPs in wildcard responses.
54. Checking for vulnerable third-party integrations on wildcards.
55. Testing for command injection in subdomain input points.
56. Weak rate-limiting configurations across wildcard subdomains.
57. Identifying unpatched software versions on subdomains.
58. Misconfigured debug or verbose output on subdomains.
59. Analyzing source code repositories linked to wildcards.
60. Testing for sensitive files (.env, .bak) in wildcard responses.
________________
61-80: Advanced Attack Vectors
61. Exploiting insecure redirects in wildcard responses.
62. Testing for unvalidated redirects in subdomains.
63. Discovering hidden parameters using wildcard fuzzing.
64. HTTP parameter pollution in wildcard subdomains.
65. Reverse engineering JavaScript files from wildcard APIs.
66. Testing subdomain-specific user authentication flaws.
67. Bypassing input validation across subdomains.
68. Testing for insecure deserialization vulnerabilities.
69. Chaining vulnerabilities across multiple subdomains.
70. Exploiting wildcard subdomain cookie issues.
71. Analyzing local file inclusion (LFI) in wildcard responses.
72. Exploiting remote file inclusion (RFI) in wildcard domains.
73. Analyzing DNS rebinding attacks on wildcard APIs.
74. Checking for FTP or SMTP exposure on wildcard services.
75. Abuse of public-facing debugging tools on wildcards.
76. Testing GraphQL misconfigurations on wildcard subdomains.
77. Finding DOM-based XSS in wildcard JavaScript files.
78. Exploiting insecure cryptographic storage in subdomains.
79. Testing third-party service integrations for insecure configurations.
80. Exploiting CORS preflight requests on subdomain APIs.
________________
81-100: Specialized Vulnerability Hunting
81. Identifying misconfigured cloud services attached to wildcards.
82. Exploiting wildcard subdomains hosted on S3 buckets.
83. Discovering unlinked API endpoints via subdomain brute-forcing.
84. Testing for Cross-Site WebSocket Hijacking (CSWSH).
85. Analyzing session replay attacks across subdomains.
86. Testing for content security policy (CSP) misconfigurations.
87. Abuse of HTTP2 features in wildcard subdomain responses.
88. Leveraging time-based attacks (timing leaks) on wildcards.
89. Testing for padding oracle attacks on subdomain responses.
90. Exfiltrating data via wildcard subdomain DNS channels.
91. Identifying wildcard domains running outdated CMS software.
92. Testing for business logic vulnerabilities in subdomains.
93. Discovering hidden endpoints using fuzzing (Burp Suite, ffuf).
94. Performing differential analysis of HTTP headers in wildcard responses.
95. Abuse of third-party OAuth implementations on subdomains.
96. Chaining OpenID Connect vulnerabilities across wildcards.
97. Exploiting wildcard domains with insufficient transport layer security.
98. Testing for insecure service workers on wildcard subdomains.
99. Analyzing HTTP response splitting vulnerabilities.
100. Abuse of misconfigured DNS TXT records for subdomains.
________________
How to Use This List
1. Prioritize & Automate: Start with tools like Burp Suite, Subfinder, and Nuclei to automate initial scans.
2. Focus Areas: Focus on high-risk items like authentication flaws, XSS, and API vulnerabilities.
3. Chain Vulnerabilities: Look for chaining opportunities (e.g., CORS misconfig + XSS).
4. Manual Testing: Use manual exploration for complex or custom functionality.
Domain
Here's a structured list of 100 topics to guide your bug bounty journey focused on exploring vulnerabilities in a specific domain. These topics cover reconnaissance, vulnerability identification, and advanced attack methods, organized in ascending order of complexity:
________________
1-20: Reconnaissance and Information Gathering
1. WHOIS lookup for domain ownership and DNS information.
2. Identifying domain IP ranges and hosting providers.
3. DNS record enumeration (A, MX, TXT, CNAME, etc.).
4. Reverse DNS lookup for additional domain insights.
5. Enumerating subdomains for the given domain.
6. Checking SSL/TLS certificates for associated subdomains.
7. Searching historical DNS records using tools like SecurityTrails.
8. Analyzing robots.txt for hidden endpoints.
9. Parsing sitemap.xml for discoverable resources.
10. Checking server response headers for version information.
11. Identifying technologies used with Wappalyzer or BuiltWith.
12. Extracting email addresses linked to the domain.
13. Searching for domain mentions in public code repositories (e.g., GitHub).
14. Analyzing domain presence in web archives (Wayback Machine).
15. Monitoring social media mentions related to the domain.
16. Searching for exposed API keys or tokens in public repositories.
17. Testing for domain-specific data leaks in pastebin dumps.
18. Using Google Dorks for sensitive file discovery.
19. Examining DNS zone transfers for misconfigurations.
20. Identifying content delivery network (CDN) dependencies.
________________
21-40: Server-Side Vulnerabilities
21. Detecting open ports and services using Nmap.
22. Identifying outdated software versions on the domain.
23. Checking for vulnerable plugins or CMS platforms.
24. Testing for misconfigured HTTP methods (e.g., PUT, DELETE).
25. Analyzing server error pages for stack traces or sensitive information.
26. Scanning for directory indexing vulnerabilities.
27. Searching for sensitive files (e.g., .env, .git, .bak).
28. Testing for directory traversal vulnerabilities.
29. Exploiting local file inclusion (LFI) vulnerabilities.
30. Testing for remote file inclusion (RFI) vulnerabilities.
31. Analyzing exposed .DS_Store or other metadata files.
32. Detecting insecure server configurations (e.g., verbose error messages).
33. Testing for command injection vulnerabilities.
34. Identifying vulnerable web server configurations (e.g., Apache, Nginx).
35. Exploiting known CVEs affecting the domain’s server software.
36. Checking for HTTP response splitting vulnerabilities.
37. Testing for insecure cross-origin resource sharing (CORS).
38. Exploiting host header injection vulnerabilities.
39. Discovering potential server-side request forgery (SSRF) vectors.
40. Testing for insecure deserialization vulnerabilities.
________________
41-60: Application-Level Vulnerabilities
41. Testing for cross-site scripting (XSS) vulnerabilities.
42. Discovering SQL injection in URL parameters or forms.
43. Testing for NoSQL injection vulnerabilities.
44. Identifying insecure direct object references (IDOR).
45. Analyzing session management issues (e.g., insecure cookies).
46. Testing for CSRF vulnerabilities in forms or endpoints.
47. Analyzing improper input validation mechanisms.
48. Exploring hidden parameters with tools like Arjun.
49. Fuzzing input fields for unexpected responses.
50. Identifying business logic flaws in application workflows.
51. Exploiting poorly implemented authentication mechanisms.
52. Testing for open redirect vulnerabilities.
53. Identifying sensitive data exposure via API endpoints.
54. Testing for rate-limiting bypasses in forms or APIs.
55. Analyzing caching mechanisms for sensitive data exposure.
56. Examining custom error messages for sensitive information.
57. Testing multi-step workflows for logical vulnerabilities.
58. Chaining vulnerabilities to escalate impact.
59. Testing for weak password policies in the domain.
60. Exploiting wildcard DNS configurations in application logic.
________________
61-80: API-Specific Vulnerabilities
61. Enumerating API endpoints for domain-related resources.
62. Testing for improper API authentication or token validation.
63. Exploiting over-permissive CORS in API endpoints.
64. Testing for excessive data exposure in API responses.
65. Identifying mass assignment vulnerabilities in API operations.
66. Testing API endpoints for rate-limiting flaws.
67. Identifying broken object-level authorization (BOLA) issues.
68. Testing for broken function-level authorization in APIs.
69. Detecting hidden API parameters with fuzzing tools.
70. Analyzing API documentation for potential flaws.
71. Testing for GraphQL API misconfigurations.
72. Exploiting insecure WebSocket implementations.
73. Checking API responses for hardcoded sensitive data.
74. Testing for session replay attacks in APIs.
75. Identifying API response leaks from development environments.
76. Exploiting verbose error messages in API responses.
77. Testing for JSON injection vulnerabilities.
78. Exploiting insecure pagination mechanisms.
79. Testing for file upload vulnerabilities in API endpoints.
80. Exploring deprecated or unpatched API methods.
________________
81-100: Advanced Techniques and Chaining
81. Exploiting DNS rebinding attacks for domain control.
82. Testing for padding oracle attacks in domain encryption mechanisms.
83. Analyzing custom encryption methods for flaws.
84. Testing for prototype pollution in JavaScript responses.
85. Exploiting insecure deserialization in JSON or XML inputs.
86. Testing for SSTI (Server-Side Template Injection).
87. Exploiting insecure service workers linked to the domain.
88. Performing DNS cache poisoning on public-facing records.
89. Testing for insecure CSP configurations.
90. Chaining CORS and XSS vulnerabilities for broader impact.
91. Exploiting JWT misconfigurations in authentication workflows.
92. Identifying misconfigured OAuth or OpenID Connect flows.
93. Testing for subdomain takeover via dangling records.
94. Exploiting content spoofing vulnerabilities in responses.
95. Detecting session fixation attacks in authentication flows.
96. Leveraging CSWSH (Cross-Site WebSocket Hijacking) vulnerabilities.
97. Testing for HTTP/2-specific vulnerabilities in domain servers.
98. Exploiting multi-factor authentication (MFA) bypass techniques.
99. Performing side-channel timing attacks on sensitive endpoints.
100. Developing custom attack vectors using domain-specific logic.
________________
How to Use This List
1. Prioritize: Begin with reconnaissance to gather information and build an attack surface.
2. Automate: Use tools like Burp Suite, ffuf, and Nmap for scanning.
3. Manual Testing: Focus on logical flaws and complex vulnerabilities.
4. Track Progress: Document findings and test areas systematically.
5. Report Properly: Prepare detailed reports for valid vulnerabilities.
Information Gathering
Here’s a curated list of 100 topics specifically for information gathering in web applications, organized in ascending order of complexity. This phase lays the foundation for identifying potential vulnerabilities by gathering as much data as possible about the target web application.
________________
1-20: Domain and Basic Information
1. WHOIS lookup for domain registration details.
2. Identifying IP addresses of the web application.
3. Enumerating DNS records (A, MX, TXT, CNAME).
4. Reverse DNS lookup for related IPs.
5. Analyzing SSL/TLS certificates for subdomains.
6. Discovering subdomains using tools like Sublist3r or Amass.
7. Using historical DNS records for domain insights.
8. Examining robots.txt for disallowed directories.
9. Parsing sitemap.xml for indexed URLs.
10. Using Google Dorks to search for sensitive files and endpoints.
11. Checking for publicly exposed directories.
12. Monitoring HTTP headers for server and technology stack information.
13. Identifying CMS or frameworks in use.
14. Analyzing HTTP response codes for clues about functionality.
15. Looking for error pages that expose sensitive details.
16. Enumerating virtual hosts (vhosts).
17. Analyzing shared hosting for neighboring websites.
18. Examining DNS zone transfer for misconfigurations.
19. Mapping the web application using tools like OWASP ZAP.
20. Capturing web application traffic with Burp Suite.
________________
21-40: Technology Stack Identification
21. Identifying backend technologies (PHP, Node.js, etc.).
22. Detecting frontend libraries and frameworks (React, Angular).
23. Enumerating JavaScript files for endpoints and sensitive data.
24. Identifying database technologies used in the backend.
25. Detecting load balancers or reverse proxies.
26. Using Wappalyzer or BuiltWith to enumerate technologies.
27. Checking third-party integrations and analytics tools.
28. Scanning for plugins, themes, and extensions in use.
29. Monitoring server banners for version information.
30. Checking web application deployment on cloud services.
31. Enumerating CDN providers for static assets.
32. Identifying exposed configuration files (config.php, .env).
33. Analyzing HTTP/2 and HTTP/3 adoption for unique headers.
34. Scraping metadata from the web application.
35. Checking for hardcoded API keys in client-side scripts.
36. Analyzing content security policy (CSP) for misconfigurations.
37. Identifying external assets hosted on third-party domains.
38. Testing web application firewalls (WAF) with payloads.
39. Enumerating user-agent-specific responses.
40. Analyzing response time differences for sensitive endpoints.
________________
41-60: File and Endpoint Discovery
41. Using tools like Gobuster to brute force directories.
42. Scanning for backup files (.bak, .old, .zip).
43. Identifying exposed Git repositories (.git).
44. Discovering endpoints with tools like FFUF or Dirbuster.
45. Searching for .DS_Store files revealing directory structure.
46. Parsing server logs from publicly accessible paths.
47. Finding temporary files left during development (~, .tmp).
48. Analyzing version control files like .svn or .hg.
49. Checking for web.config or htaccess files.
50. Analyzing uploaded assets for hidden metadata.
51. Examining error messages for sensitive information.
52. Identifying sensitive parameters in URLs using Arjun.
53. Discovering development or staging environments.
54. Parsing CSS files for hidden elements or comments.
55. Checking for test or debug endpoints in JavaScript files.
56. Discovering undocumented API endpoints.
57. Parsing API schemas or documentation.
58. Identifying hardcoded credentials in source files.
59. Checking exposed paths in error responses.
60. Examining environment-specific endpoints (/dev/, /staging/).
________________
61-80: User and Application Behavior
61. Analyzing login, signup, and password reset flows.
62. Checking for default credentials.
63. Examining role-based access control (RBAC) behavior.
64. Scraping user roles or permissions from visible elements.
65. Monitoring HTTP headers for session tokens.
66. Analyzing cookie attributes for security configurations.
67. Testing multi-language or localization features.
68. Identifying hidden input fields in forms.
69. Scraping autocomplete suggestions for sensitive data.
70. Identifying referral links in outbound requests.
71. Observing behavior with different user-agents or devices.
72. Testing application behavior with no JavaScript enabled.
73. Checking for multi-factor authentication prompts.
74. Monitoring for inconsistent responses between HTTP and HTTPS.
75. Analyzing input validation behavior in forms.
76. Observing time-based responses for sensitive actions.
77. Testing file upload restrictions and allowed extensions.
78. Identifying reCAPTCHA or anti-bot mechanisms.
79. Checking for rate-limiting on key endpoints.
80. Parsing autocomplete tokens for user data exposure.
________________
81-100: Advanced Information Gathering
81. Discovering subdomains via certificate transparency logs.
82. Monitoring DNS changes over time.
83. Searching for sensitive information in public repositories.
84. Examining JavaScript dependencies for vulnerabilities.
85. Searching for CORS misconfigurations in cross-domain resources.
86. Identifying sensitive strings in web page comments.
87. Parsing WebSocket traffic for undocumented endpoints.
88. Analyzing CSP headers for exploitable weaknesses.
89. Checking for insecure referrer policies.
90. Searching for internal domain references in responses.
91. Analyzing GraphQL schema and introspection queries.
92. Enumerating exposed GraphQL endpoints.
93. Monitoring session cookies for predictable patterns.
94. Scraping and analyzing source maps if available.
95. Identifying OAuth redirection URLs for open redirect flaws.
96. Parsing third-party integrations for callback endpoints.
97. Searching for sensitive data in Swagger API documentation.
98. Analyzing header-based redirects for clues.
99. Testing file uploads for hidden functionality.
100. Capturing and analyzing all outbound requests from the application.
________________
How to Use This List
1. Automate Reconnaissance: Use tools like Burp Suite, Nmap, and Gobuster for initial scans.
2. Manual Testing: Carefully explore JavaScript files, API endpoints, and error messages.
3. Prioritize: Focus on areas exposing sensitive data or outdated technologies.
4. Document Findings: Record each step and its results systematically.
Configuration
Here’s a comprehensive list of 100 topics focused specifically on configuration-related vulnerabilities in web applications, arranged in ascending order of complexity. These topics cover both server-side and application-level misconfigurations that can expose sensitive data or lead to exploitation.
________________
1-20: Basic Server and Environment Configuration
1. Checking for default server configurations.
2. Identifying server version disclosure in headers.
3. Analyzing HTTP headers for security misconfigurations.
4. Ensuring directory listing is disabled.
5. Verifying the presence of an updated web server.
6. Checking for unnecessary open ports.
7. Testing for exposed .htaccess or web.config files.
8. Verifying SSL/TLS certificate validity and configuration.
9. Testing for outdated SSL/TLS protocols (e.g., SSLv3, TLS 1.0).
10. Checking for missing HSTS headers.
11. Identifying exposed debug or development environments.
12. Testing for sensitive environment files (.env, env.json).
13. Checking for insecure permissions on files and directories.
14. Identifying the use of default or weak passwords.
15. Checking for sensitive backup files (.bak, .old).
16. Analyzing server-side technology stack exposure.
17. Searching for sensitive tokens in server logs.
18. Ensuring proper error message suppression.
19. Checking for hardcoded credentials in configuration files.
20. Identifying insecure session storage mechanisms.
________________
21-40: Application-Specific Configuration
21. Verifying proper cookie attributes (HttpOnly, Secure, SameSite).
22. Checking for insecure API keys or secrets in config files.
23. Testing for weak JWT signing algorithms (e.g., none).
24. Ensuring CORS policy is correctly configured.
25. Identifying insecure X-Frame-Options settings.
26. Checking X-Content-Type-Options for MIME sniffing prevention.
27. Verifying the presence of Content-Security-Policy (CSP).
28. Analyzing Referrer-Policy for data exposure risks.
29. Ensuring proper Cross-Origin Resource Sharing (CORS) settings.
30. Checking for vulnerable configurations in third-party plugins.
31. Testing for insecure OAuth configurations.
32. Examining API rate-limiting settings.
33. Verifying file upload restrictions and validation mechanisms.
34. Ensuring database credentials are not hardcoded.
35. Testing for insecure database configurations (e.g., public access).
36. Checking email server configurations for open relay vulnerabilities.
37. Identifying insecure DNS configurations (e.g., DNS rebinding).
38. Testing for exposed cloud service credentials in configurations.
39. Ensuring secure configuration of CDN and caching mechanisms.
40. Analyzing WebSocket configurations for open connections.
________________
41-60: Logging and Debugging Configurations
41. Checking for debug mode enabled in production.
42. Testing for exposed logs accessible via the web.
43. Verifying sensitive data is not logged in plain text.
44. Ensuring proper rotation of log files.
45. Testing for verbose error messages revealing stack traces.
46. Verifying database query logs for sensitive information.
47. Checking for publicly accessible crash dump files.
48. Ensuring real-time debugging tools are disabled in production.
49. Analyzing logging levels for overexposure of sensitive data.
50. Testing for exposure of internal IPs in log files.
51. Verifying authentication and authorization logs for security issues.
52. Checking for insecure storage of log files on public servers.
53. Ensuring log files are encrypted in transit and at rest.
54. Testing for exposed configuration debugging tools.
55. Analyzing application crash reports for sensitive data leaks.
56. Verifying logging configurations for external monitoring tools.
57. Ensuring debug endpoints are disabled in APIs.
58. Testing for improperly configured runtime environment variables.
59. Analyzing log files for exposed authentication tokens.
60. Checking for sensitive information in system crash reports.
________________
61-80: Frameworks and Libraries
61. Verifying framework configuration files are not publicly accessible.
62. Testing for insecure default configurations in frameworks.
63. Ensuring unnecessary services and modules are disabled.
64. Checking for exposed .git or .svn directories.
65. Testing for vulnerable package versions in libraries.
66. Identifying unnecessary third-party dependencies in the application.
67. Ensuring default configurations of libraries are hardened.
68. Testing for insecure template configurations in frameworks.
69. Ensuring secure dependency resolution in package managers.
70. Verifying session management configurations in frameworks.
71. Testing for missing or misconfigured CSRF protections.
72. Checking for deprecated APIs or functions in frameworks.
73. Ensuring secure access control configurations in frameworks.
74. Testing for insecure defaults in cloud-based services.
75. Analyzing deployment configurations for sensitive keys.
76. Ensuring secure configuration of cron jobs or scheduled tasks.
77. Verifying security of API gateway configurations.
78. Testing for insecure message queue configurations.
79. Checking for insecure configurations in CI/CD pipelines.
80. Ensuring secure configurations in container orchestration tools.
________________
81-100: Advanced Configurations
81. Testing for insecure configurations in Kubernetes pods.
82. Ensuring IAM roles and permissions are correctly configured.
83. Verifying cloud storage buckets for public accessibility.
84. Testing for unencrypted traffic between services.
85. Checking for insecure settings in reverse proxies.
86. Verifying database encryption settings.
87. Testing for insecure default configurations in Docker images.
88. Ensuring secure load balancer configurations.
89. Testing for misconfigured access control lists (ACLs).
90. Ensuring proper firewall rules for application servers.
91. Verifying secure configurations of shared hosting environments.
92. Testing for exposed CI/CD credentials in config files.
93. Checking for insecure caching mechanisms (e.g., Memcached, Redis).
94. Testing for hardcoded secrets in IaC (Infrastructure as Code) templates.
95. Verifying access restrictions on internal dashboards.
96. Analyzing telemetry and analytics configurations for data leaks.
97. Checking for overexposed monitoring tools (e.g., Kibana, Grafana).
98. Ensuring secure storage of encryption keys and secrets.
99. Testing for sensitive configurations in edge services (e.g., CDN).
100. Ensuring secure configurations in serverless computing environments.
________________
How to Use This List
1. Systematic Approach: Tackle configurations by layers (server, application, frameworks).
2. Automation: Use tools like Burp Suite, Nmap, and Nikto to scan configurations.
3. Manual Testing: Confirm findings through careful exploration and analysis.
4. Document Configurations: Log vulnerable settings for reference in future engagements.
Transmission
Here’s a list of 100 topics focusing specifically on vulnerabilities and sensitive information leakage during data transmission in web applications, ordered by complexity. These topics address insecure data handling, protocol weaknesses, and other transmission-related issues.
________________
1–20: Basic HTTPS and SSL/TLS Configuration
1. Testing for HTTP instead of HTTPS for sensitive data transmission.
2. Verifying SSL/TLS certificate validity and expiration.
3. Checking for self-signed or untrusted SSL certificates.
4. Testing for outdated SSL/TLS protocols (e.g., SSLv3, TLS 1.0).
5. Verifying if HSTS is properly implemented.
6. Analyzing SSL certificate revocation (OCSP Stapling).
7. Testing for weak SSL ciphers and encryption algorithms.
8. Verifying secure renegotiation in TLS connections.
9. Checking for exposed intermediate certificates.
10. Testing for mixed content issues (secure and insecure resources).
11. Identifying lack of Forward Secrecy in SSL/TLS configuration.
12. Verifying HTTPS redirection for all HTTP endpoints.
13. Testing for improper wildcard SSL certificate configurations.
14. Analyzing public key pinning configuration.
15. Testing for expired intermediate or root CA certificates.
16. Verifying security of SSL/TLS key exchange algorithms.
17. Testing for insecure SSL/TLS compression (CRIME attack).
18. Checking for supported anonymous ciphers in SSL/TLS.
19. Testing for improper implementation of mutual SSL authentication.
20. Verifying TLS downgrade protection (e.g., preventing POODLE attack).
________________
21–40: Authentication and Session Handling During Transmission
21. Testing for insecure session tokens transmitted over HTTP.
22. Verifying Secure and HttpOnly attributes in cookies.
23. Testing for session ID leakage through HTTP headers.
24. Analyzing session fixation vulnerabilities during transmission.
25. Verifying encrypted transmission of JWTs and API tokens.
26. Testing for plaintext passwords in transmission.
27. Checking for multi-factor authentication (MFA) bypass issues.
28. Verifying secure transmission of CSRF tokens.
29. Analyzing OAuth access token transmission.
30. Testing for replay attacks due to weak token handling.
31. Ensuring proper revocation of transmitted tokens.
32. Verifying encryption for WebSocket communication.
33. Testing for IDOR vulnerabilities in transmitted session data.
34. Checking for insecure session cookies in third-party domains.
35. Testing for session ID disclosure in error messages.
36. Verifying secure logout mechanisms in transmitted data.
37. Testing for token expiration during active transmission.
38. Ensuring secure transmission of refresh tokens.
39. Testing for vulnerable session regeneration mechanisms.
40. Analyzing authorization header handling in API requests.
________________
41–60: Sensitive Data Leakage in Transmission
41. Testing for plaintext transmission of sensitive fields (e.g., credit cards).
42. Checking for sensitive information in URL parameters.
43. Analyzing HTTP headers for data exposure (Referer, User-Agent).
44. Verifying secure transmission of PII (personally identifiable information).
45. Testing for unencrypted email or phone number transmission.
46. Checking for sensitive information in query string parameters.
47. Verifying file uploads are transmitted securely.
48. Testing for sensitive data in WebSocket frames.
49. Analyzing DNS leakage during data transmission.
50. Verifying encrypted transmission of form data.
51. Testing for sensitive data exposure in redirects.
52. Checking for improper encoding of transmitted data.
53. Verifying secure data transmission in third-party API calls.
54. Analyzing unencrypted logs of transmitted data.
55. Testing for sensitive cookies in cross-site requests.
56. Verifying masking of sensitive input fields during transmission.
57. Analyzing sensitive data in debug headers.
58. Testing for sensitive metadata leakage during uploads.
59. Verifying secure streaming of multimedia content.
60. Checking for sensitive information leakage in error pages.
________________
61–80: Transmission in APIs and Web Services
61. Testing for API keys in query parameters during transmission.
62. Verifying secure use of Basic Authentication in APIs.
63. Testing for exposed API tokens in transmitted headers.
64. Analyzing OAuth flows for insecure token transmission.
65. Verifying secure handling of refresh tokens in APIs.
66. Testing for vulnerable GraphQL queries during transmission.
67. Checking for sensitive data in SOAP API requests.
68. Verifying secure JSON and XML transmission.
69. Testing for excessive data exposure in API responses.
70. Analyzing WebSocket data leakage in real-time apps.
71. Verifying secure POST and GET request handling in APIs.
72. Testing for plaintext credentials in API requests.
73. Analyzing token expiration during API calls.
74. Checking for unnecessary transmission of sensitive data.
75. Verifying secure implementation of API rate limiting.
76. Testing for API misconfigurations in CORS during transmission.
77. Verifying secure error message handling in APIs.
78. Testing for sensitive information in transmitted API logs.
79. Checking for hardcoded credentials in transmitted payloads.
80. Verifying secure authentication flow in API transmission.
________________
81–100: Advanced and Specialized Transmission Scenarios
81. Testing for man-in-the-middle (MITM) vulnerabilities.
82. Analyzing DNS rebinding attacks in transmission.
83. Testing for improper encryption in real-time chat applications.
84. Verifying secure configuration of third-party analytics tools.
85. Testing for improper SSO token transmission.
86. Verifying secure handling of payment gateway data.
87. Analyzing IoT device communication for unencrypted transmission.
88. Testing for data exposure in serverless function responses.
89. Verifying secure file download mechanisms in transmitted data.
90. Analyzing WebRTC configurations for data leakage.
91. Testing for Cross-Site WebSocket Hijacking vulnerabilities.
92. Verifying secure configuration of content delivery networks (CDNs).
93. Testing for improper encoding in transmitted binary data.
94. Analyzing browser prefetching for data exposure risks.
95. Testing for insecure telemetry data transmission.
96. Verifying secure encryption of transmitted audit logs.
97. Analyzing e-commerce checkout flows for data exposure.
98. Verifying secure transmission of user session states in cookies.
99. Testing for insecure transmission in PWA (Progressive Web Apps).
100. Verifying secure implementation of end-to-end encryption.
________________
How to Use This List
* Beginner: Start with common HTTP/HTTPS and session handling issues.
* Intermediate: Explore API and WebSocket-related transmission vulnerabilities.
* Advanced: Test for specialized vulnerabilities in real-time apps, CDNs, and serverless configurations.
Authentication
Here’s a curated list of 100 topics for exploring vulnerabilities and extracting sensitive information related to authentication mechanisms in web applications, ordered from basic to advanced:
________________
1–20: Basic Authentication Flaws
1. Testing for weak default credentials.
2. Verifying lack of password strength requirements.
3. Testing for credential stuffing vulnerabilities.
4. Verifying insecure password storage (e.g., plaintext passwords).
5. Testing for predictable usernames (e.g., admin, user1).
6. Testing for insecure password recovery mechanisms.
7. Checking for username enumeration through login error messages.
8. Testing for weak CAPTCHA implementations.
9. Verifying lack of account lockout after multiple failed attempts.
10. Testing for sensitive data in error messages.
11. Checking for hardcoded credentials in the codebase.
12. Verifying lack of HTTPS for login pages.
13. Testing for reflected credentials in URLs or error pages.
14. Verifying plaintext credentials in browser cache or autocomplete.
15. Checking for reuse of tokens across sessions.
16. Testing for missing CSRF protection on login forms.
17. Testing for credentials leaked in the Referer header.
18. Verifying insecure password hints (e.g., too descriptive).
19. Checking for open redirects after authentication.
20. Testing for missing secure cookie flags (HttpOnly, Secure).
________________
21–40: Advanced Password and Login Issues
21. Testing for password disclosure in response payloads.
22. Verifying insecure two-factor authentication (2FA) mechanisms.
23. Testing for replay attacks with valid session tokens.
24. Checking for session fixation during login.
25. Testing for improper password reset links.
26. Verifying time-based authentication brute force.
27. Testing for token exposure in web storage (localStorage/sessionStorage).
28. Checking for lack of rate-limiting on authentication endpoints.
29. Testing for excessive information in authentication logs.
30. Verifying proper encoding of credentials in API requests.
31. Testing for credentials exposed in JavaScript source maps.
32. Analyzing token storage in Single Page Applications (SPAs).
33. Verifying insecure remember me functionality.
34. Testing for missing logout functionality.
35. Checking for improperly implemented biometric authentication.
36. Testing for poor OTP (One-Time Password) generation.
37. Verifying bypassable client-side validation on login forms.
38. Testing for session hijacking via stolen cookies.
39. Checking for improper use of authentication tokens in APIs.
40. Testing for insecure temporary password mechanisms.
________________
41–60: Multi-Factor Authentication (MFA) Vulnerabilities
41. Testing for bypassable MFA (e.g., via 2FA reset).
42. Verifying insecure transmission of 2FA codes.
43. Testing for OTP replay vulnerabilities.
44. Checking for missing MFA implementation on critical accounts.
45. Verifying hardcoded backup codes in source code.
46. Testing for insufficient entropy in generated OTPs.
47. Verifying SMS-based 2FA vulnerabilities (e.g., SIM swapping).
48. Testing for improper invalidation of backup codes.
49. Checking for bypassable email-based MFA mechanisms.
50. Testing for lack of expiration in 2FA tokens.
51. Verifying vulnerability in QR code-based MFA setup.
52. Testing for insecure recovery options for MFA.
53. Checking for weak fallback mechanisms (e.g., security questions).
54. Testing for open redirects in MFA validation endpoints.
55. Verifying insecure push-based MFA mechanisms.
56. Testing for session persistence after MFA bypass.
57. Analyzing MFA tokens for predictable patterns.
58. Testing for session cookie reuse across MFA-protected accounts.
59. Checking for MFA token leakage in logs or browser storage.
60. Verifying proper revocation of MFA tokens during account changes.
________________
61–80: API Authentication Flaws
61. Testing for insecure API keys in request headers.
62. Verifying exposed API keys in front-end code.
63. Testing for improper validation of JWTs.
64. Checking for expired tokens accepted by APIs.
65. Verifying hardcoded API credentials in source code.
66. Testing for missing signature validation in API tokens.
67. Analyzing improper OAuth token exchange flows.
68. Testing for open API endpoints requiring no authentication.
69. Verifying weak session management in API requests.
70. Testing for IDOR vulnerabilities in authentication APIs.
71. Analyzing excessive privileges assigned to API tokens.
72. Testing for missing CORS restrictions on authentication endpoints.
73. Verifying token leakage in error messages.
74. Testing for improper token invalidation after logout.
75. Verifying tokens stored in query strings or URLs.
76. Testing for vulnerable SSO (Single Sign-On) flows.
77. Checking for missing revocation mechanisms in OAuth tokens.
78. Testing for weak API token rotation mechanisms.
79. Verifying insecure handling of refresh tokens.
80. Analyzing exposed GraphQL mutations for authentication flaws.
________________
81–100: Advanced Authentication Exploitation
81. Testing for session cloning across devices.
82. Verifying improper handling of expired sessions.
83. Testing for inadequate token encryption.
84. Checking for token leakage in WebSocket headers.
85. Testing for improper use of bearer tokens in insecure channels.
86. Verifying token replay in multi-user scenarios.
87. Testing for sensitive scopes in exposed OAuth tokens.
88. Verifying token usage in third-party integrations.
89. Testing for vulnerability in federated authentication mechanisms.
90. Checking for bypassable SAML authentication configurations.
91. Verifying insecure user impersonation mechanisms.
92. Testing for vulnerable delegated authentication flows.
93. Analyzing JWT claims for sensitive data exposure.
94. Verifying lack of signature validation in JWTs.
95. Testing for cross-tenant access vulnerabilities in multi-tenant apps.
96. Verifying improper token expiration handling during token refresh.
97. Testing for exposed private keys used for token signing.
98. Verifying lack of PKCE (Proof Key for Code Exchange) in OAuth flows.
99. Testing for bypassable device authentication mechanisms.
100. Checking for sensitive information in cookies during SSO transitions.
________________
How to Use This List
1. Basic Tests: Start with issues like insecure passwords, session management, and MFA bypasses.
2. Intermediate Tests: Move into API-related vulnerabilities, JWT handling, and OAuth flows.
3. Advanced Exploitation: Focus on advanced issues like SAML misconfigurations, PKCE, and federated authentication vulnerabilities.
Session
Here is a list of 100 topics specifically focused on sessions in web applications. The list is arranged in ascending order of complexity, beginning with fundamental issues and moving toward advanced session vulnerabilities:
________________
1–20: Basics of Session Management
1. Testing for missing HttpOnly cookie flag.
2. Testing for missing Secure cookie flag.
3. Checking for session IDs transmitted over unencrypted channels.
4. Testing for session fixation vulnerabilities.
5. Verifying that session IDs are invalidated after logout.
6. Checking for reuse of session IDs after login/logout cycles.
7. Testing for predictable session ID generation.
8. Verifying session expiration after inactivity.
9. Testing for improper handling of session timeouts.
10. Checking for session tokens stored in URL query strings.
11. Testing for session ID exposure in browser cache.
12. Verifying session token storage in localStorage or sessionStorage.
13. Checking for session ID leakage in HTTP Referer headers.
14. Testing for improper session termination on the server-side.
15. Verifying that session IDs are sufficiently long and random.
16. Testing for duplicate session tokens across users.
17. Checking for session token exposure in error messages.
18. Testing for session tokens shared between HTTP and HTTPS endpoints.
19. Verifying the proper scope of session cookies (SameSite attribute).
20. Checking for insecure session cookies in subdomains.
________________
21–40: Intermediate Session Vulnerabilities
21. Testing for session tokens exposed in client-side JavaScript.
22. Checking for insecure session sharing between users (e.g., account switching).
23. Testing for weak session token hashing algorithms.
24. Verifying proper invalidation of sessions during password changes.
25. Checking for session replay vulnerabilities.
26. Testing for session hijacking using stolen cookies.
27. Verifying session persistence across browser instances.
28. Testing for session fixation in cross-origin contexts.
29. Checking for inconsistent session validation across endpoints.
30. Verifying secure logout mechanisms for Single Page Applications (SPAs).
31. Testing for session token leakage in third-party integrations.
32. Checking for insecure session tokens in WebSocket connections.
33. Verifying proper handling of session state during SSO transitions.
34. Testing for lack of session token rotation upon privilege escalation.
35. Verifying secure handling of session data in multi-tenant applications.
36. Testing for race conditions in session management.
37. Checking for improper handling of expired sessions.
38. Verifying unique session identifiers for each login instance.
39. Testing for session tokens hardcoded in application source code.
40. Checking for improper session handling during 2FA processes.
________________
41–60: Advanced Session Vulnerabilities
41. Testing for session token replay in API calls.
42. Verifying session token invalidation during user deactivation.
43. Testing for session cloning across devices.
44. Checking for exposed session tokens in mobile apps.
45. Verifying proper handling of simultaneous logins from different devices.
46. Testing for shared sessions between different roles (e.g., user/admin).
47. Verifying session token expiration policies in JWTs.
48. Testing for session token tampering in signed cookies.
49. Checking for session management flaws in load-balanced environments.
50. Testing for session token leakage in browser extensions.
51. Verifying proper session termination during account deletion.
52. Checking for vulnerable session ID handling in legacy applications.
53. Testing for session state vulnerabilities in OAuth flows.
54. Verifying improper session storage in application logs.
55. Testing for session token leakage in CORS preflight requests.
56. Checking for session data exposure in debug endpoints.
57. Verifying proper validation of session tokens in microservices.
58. Testing for excessive privileges assigned to session tokens.
59. Checking for vulnerable session caching mechanisms.
60. Verifying insecure session handling in federated authentication systems.
________________
61–80: Specialized Session Testing
61. Testing for session token leakage in GraphQL queries.
62. Verifying weak encryption of session tokens in transport.
63. Testing for insecure refresh token handling in sessions.
64. Checking for improper session revocation mechanisms.
65. Testing for session impersonation using stolen credentials.
66. Verifying improper handling of session state in browser tabs.
67. Testing for session data injection vulnerabilities.
68. Checking for cross-origin session leakage.
69. Verifying insecure session persistence in hybrid mobile apps.
70. Testing for missing CSRF protection in session-related endpoints.
71. Checking for insecure session token exchange in third-party APIs.
72. Testing for session ID reuse across different applications.
73. Verifying proper invalidation of long-lived session tokens.
74. Testing for session hijacking through insecure iframe embedding.
75. Checking for session data exposure in performance monitoring tools.
76. Verifying session token tampering in client-side analytics scripts.
77. Testing for session validation bypasses in API endpoints.
78. Verifying improper handling of session tokens during upgrades.
79. Testing for session token leakage in push notifications.
80. Checking for sensitive session data exposure in audit logs.
________________
81–100: Cutting-Edge Session Research
81. Testing for session vulnerabilities in WebSocket authentication flows.
82. Verifying proper expiration of JWT-based session tokens.
83. Checking for session data leakage in distributed caching mechanisms.
84. Testing for misuse of session tokens in server-side rendering (SSR).
85. Verifying cross-domain session token scope issues.
86. Testing for insecure session persistence in offline-first applications.
87. Verifying session management flaws in progressive web apps (PWAs).
88. Testing for race conditions in session token issuance.
89. Checking for improper validation of session state during reconnections.
90. Verifying session handling during OAuth token exchange.
91. Testing for improper session state management in microservices.
92. Checking for session token leakage in application telemetry data.
93. Verifying session security in decentralized identity systems.
94. Testing for session replay attacks in event-driven architectures.
95. Checking for improper session handling in backend-as-a-service (BaaS) platforms.
96. Verifying secure session management in IoT-based web applications.
97. Testing for session token leakage in content delivery networks (CDNs).
98. Checking for insecure session revocation in passwordless authentication.
99. Verifying proper handling of session tokens in Kubernetes environments.
100. Testing for vulnerabilities in session-based rate-limiting mechanisms.
________________
How to Use This List
1. Prioritize Basics: Start with fundamental tests like cookie flags, HTTPS enforcement, and session timeouts.