SlideShare a Scribd company logo
1 of 1
Download to read offline
Get on-demand access to hundreds of security experts and premium testing tools with Cigital’s Managed Services.
Learn more at www.Cigital.com
Web Application Security
Web Application Security
Testing Checklist
Testing Checklist
Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery
mechanism for both consumer-grade and business-critical functionality these days.
As a result, the web is also the most common target for application-level attacks.
To prevent any web application security oversights, use this checklist to guide you
through the necessary steps to ensure your penetration tests are effective, efficient,
and timely.
Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery
mechanism for both consumer-grade and business-critical functionality these days.
As a result, the web is also the most common target for application-level attacks.
To prevent any web application security oversights, use this checklist to guide you
through the necessary steps to ensure your penetration tests are effective, efficient,
and timely.
This is required in case of lockouts and/or multiple team member access.
Request an understanding of the permissions/role structure.
Gather two credentials for each.
This includes areas that require manual testing specifically focused on bypassing,
escalation, and sensitive data disclosure techniques. Business logic flow can be defined
as the data flow specific, and unique, to the application. This type of functionality is
often overlooked with automated analysis.
For example
Functionality may include an approval workflow or privileged account access.
A tester must ensure:
• Integrity of the workflow
• Users can’t bypass or skips steps
• Users can’t perform privileged activities without authorization
Construct business logic and data flow.
This includes areas where users are able to add, modify, and/or delete
content. These locations require verification of input sanitization and output encoding.
For example
Applications that allow users to enter large amounts of data such as blog posts,
especially when done through HTML editors, are at high risk of injection attacks
if proper prevention mechanisms aren’t enforced.
Determine highly problematic areas of the application.
Ask the appropriate questions in order to properly plan and test the application at hand.
Step 1. Information GatheringStep 1. Information Gathering
Step 2. PlanningStep 2. Planning
This is the point when you should write the report.
Establish the “stop testing” deadline at which point the team
will document all vulnerabilities.
Assign an individual to configure and scan.
Determine the types of automated tests to be performed.
The application should be split amongst team members by functionality or
vulnerability type, depending on expertise.
Assign specific roles and credentials to each team member
(if working as a team).
If the application performs authentication, the following checks are applicable
(not exhaustive):
Session management
Brute forcing
Privilege escalation
Password complexity
Organize the types of vulnerabilities applicable for this type
of application.
Document your testing strategy to ensure each assessor knows what they’re working on
and how much time they have to complete testing-related tasks.
Internal status calls should take place twice a week and include the testers
and the project/client manager. External status calls should take place
once a week and include the internal team and the customer(s). If possible,
the project manager should walk through team status and then pass to team
members for details.
Set up status calls internally and externally.
This should be done only when the client requests it.
Document specific test cases.
If required within the terms of the contract. This aids in the execution phase
and provides details on scope if any adjustments need to be made.
Perform automated and/or manual crawling.
Clients may request an output of tests performed even if vulnerabilities
aren’t identified.
Document and collect artifacts when vulnerabilities
are discovered.
Manual tasks cover business logic and dataflow specific to the application that are
typically overlooked by automation. A manual test may look like the
following:
1. A tester identifies a URL accessed by an admin that is slightly different from
what they see
https://www.example.com/users/edit?id=123456&admin=false
2. They modify the URL in an attempt to act as an admin
https://www.example.com/users/edit?id=123456&admin=true
3. Depending on the result, a vulnerability should be documented and the
tester should navigate to similar pages to see if this issue is persistent.
Most tools send several requests to the same page to determine if the responses
are different. Many tools state that a vulnerability exists when HTTP 500 errors
are returned. It is the tester’s responsibility to review the request and the error
message to determine if a vulnerability actually occurs.
Perform manual tests.
Automation tools should be carefully selected (cover common OWASP Top 10
vulnerabilities at a minimum). This allows testers to focus their skills on the
business logic and data flow requiring manual analysis. Automated testing
differs slightly per organization depending on what tools are licensed and/or
internally built.
Perform automated tests and triage the results.
Conduct tests and discover vulnerabilities (if any exist).
Step 3. ExecutionStep 3. Execution
Step 4. ReportingStep 4. Reporting
This ensures that consistency, aesthetics, and technical writing remains intact.
Conduct technical review of final reports.
(If requested by client.) Review the results and make any appropriate adjustments
based on the conversation.
Perform a “report out” call.
This should include descriptions, instances (affected URLs), roles, evidence, steps to
reproduce, likelihood, impact, and remediation.
Formalize results.
Document results thoroughly and report to the client.
It is the application owner’s responsibility to task a developer with specific
remediation tasks. It is important to apply fixes in all similar locations of the code.
Black box test may not be exhaustive and similar issues could exist.
Address and follow the remediation guidelines in the report.
Address the vulnerabilities discovered during testing.
Step 5. RemediationStep 5. Remediation
Step 6. VerificationStep 6. Verification
Perform filter evasion techniques for XSS, attempt escalation attacks with different
roles, and perform redirects to different URLs.
Ensure the fixes prevent “transformed” attempts at the same
vulnerability.
Look for specific previously identified issues.
Review the application again.
Confirm that the vulnerabilities found during testing are resolved and ensure
the fixes can’t be evaded.
The CompleteThe Complete

More Related Content

What's hot

Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security TestingvodQA
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWebsecurify
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing ToolsEric Lai
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Security Testing
Security TestingSecurity Testing
Security TestingKiran Kumar
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Controlstevil1224
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessmentRavikumar Paghdal
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTshiriskumar
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityColin English
 
Introduction to security testing
Introduction to security testingIntroduction to security testing
Introduction to security testingNagasahas DS
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 

What's hot (20)

Security testing
Security testingSecurity testing
Security testing
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
 
Introduction to Security Testing
Introduction to Security TestingIntroduction to Security Testing
Introduction to Security Testing
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Introduction to Application Security Testing
Introduction to Application Security TestingIntroduction to Application Security Testing
Introduction to Application Security Testing
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing Tools
 
Owasp Top 10-2013
Owasp Top 10-2013Owasp Top 10-2013
Owasp Top 10-2013
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
OTG - Practical Hands on VAPT
OTG - Practical Hands on VAPTOTG - Practical Hands on VAPT
OTG - Practical Hands on VAPT
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Introduction to security testing
Introduction to security testingIntroduction to security testing
Introduction to security testing
 
Security testing
Security testingSecurity testing
Security testing
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 

Viewers also liked

MS HALL-Quiz-IIT KGP
MS HALL-Quiz-IIT KGPMS HALL-Quiz-IIT KGP
MS HALL-Quiz-IIT KGPAnkur Singh
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best PracticesSecure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best PracticesWebsecurify
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practicesScott Hurrey
 
Hyper-Efficient Mac Deployment
Hyper-Efficient Mac DeploymentHyper-Efficient Mac Deployment
Hyper-Efficient Mac DeploymentNick McSpadden
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentCigital
 
visie op talentontwikkeling in het mbo
visie op talentontwikkeling in het mbo visie op talentontwikkeling in het mbo
visie op talentontwikkeling in het mbo Sahje
 
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tipsarn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
arn to Sing Better Fast with 5 Quick Fixes for Your Voice TipsMarvin Lee
 
SafeCare in Israel
SafeCare in IsraelSafeCare in Israel
SafeCare in IsraelBASPCAN
 
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...BASPCAN
 
A retrospective service evaluation of safeguarding activity in a dental gener...
A retrospective service evaluation of safeguarding activity in a dental gener...A retrospective service evaluation of safeguarding activity in a dental gener...
A retrospective service evaluation of safeguarding activity in a dental gener...BASPCAN
 
Disabled young people's perspectives of the child protection system in England
Disabled young people's perspectives of the child protection system in EnglandDisabled young people's perspectives of the child protection system in England
Disabled young people's perspectives of the child protection system in EnglandBASPCAN
 
Omar presentation2
Omar presentation2Omar presentation2
Omar presentation2omsmills
 
How to Improve Singing Voice Quality Training & Transformation Tips
How to Improve Singing Voice Quality Training & Transformation TipsHow to Improve Singing Voice Quality Training & Transformation Tips
How to Improve Singing Voice Quality Training & Transformation TipsMarvin Lee
 
"I couldn't keep it from her... she's my friend":
"I couldn't keep it from her... she's my friend":"I couldn't keep it from her... she's my friend":
"I couldn't keep it from her... she's my friend":BASPCAN
 

Viewers also liked (20)

MS HALL-Quiz-IIT KGP
MS HALL-Quiz-IIT KGPMS HALL-Quiz-IIT KGP
MS HALL-Quiz-IIT KGP
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best PracticesSecure Coding - Web Application Security Vulnerabilities and Best Practices
Secure Coding - Web Application Security Vulnerabilities and Best Practices
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Hyper-Efficient Mac Deployment
Hyper-Efficient Mac DeploymentHyper-Efficient Mac Deployment
Hyper-Efficient Mac Deployment
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
visie op talentontwikkeling in het mbo
visie op talentontwikkeling in het mbo visie op talentontwikkeling in het mbo
visie op talentontwikkeling in het mbo
 
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tipsarn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
 
LeeBond2015
LeeBond2015LeeBond2015
LeeBond2015
 
SafeCare in Israel
SafeCare in IsraelSafeCare in Israel
SafeCare in Israel
 
Gurushant H Portfolio
Gurushant H PortfolioGurushant H Portfolio
Gurushant H Portfolio
 
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
 
A retrospective service evaluation of safeguarding activity in a dental gener...
A retrospective service evaluation of safeguarding activity in a dental gener...A retrospective service evaluation of safeguarding activity in a dental gener...
A retrospective service evaluation of safeguarding activity in a dental gener...
 
Disabled young people's perspectives of the child protection system in England
Disabled young people's perspectives of the child protection system in EnglandDisabled young people's perspectives of the child protection system in England
Disabled young people's perspectives of the child protection system in England
 
Omar presentation2
Omar presentation2Omar presentation2
Omar presentation2
 
How to Improve Singing Voice Quality Training & Transformation Tips
How to Improve Singing Voice Quality Training & Transformation TipsHow to Improve Singing Voice Quality Training & Transformation Tips
How to Improve Singing Voice Quality Training & Transformation Tips
 
"I couldn't keep it from her... she's my friend":
"I couldn't keep it from her... she's my friend":"I couldn't keep it from her... she's my friend":
"I couldn't keep it from her... she's my friend":
 
Warehouse
Warehouse Warehouse
Warehouse
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
Gaurav Resume
Gaurav ResumeGaurav Resume
Gaurav Resume
 

Similar to The Complete Web Application Security Testing Checklist

Basic interview questions for manual testing
Basic interview questions for manual testingBasic interview questions for manual testing
Basic interview questions for manual testingJYOTI RANJAN PAL
 
Manual testing
Manual testingManual testing
Manual testingAjit Jain
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Techpartnerz
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET Journal
 
Why software testing is very important for banking applications?
Why software testing is very important for banking applications?Why software testing is very important for banking applications?
Why software testing is very important for banking applications?BugRaptors
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Techpartnerz
 
Glimpse and Benefits of Testing
Glimpse and Benefits of TestingGlimpse and Benefits of Testing
Glimpse and Benefits of TestingSourabh Kasliwal
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategyDaniel Giraldo
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
M. Holovaty, Концепции автоматизированного тестирования
M. Holovaty, Концепции автоматизированного тестированияM. Holovaty, Концепции автоматизированного тестирования
M. Holovaty, Концепции автоматизированного тестированияAlex
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance Webtech Learning
 
IRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET Journal
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Controldrishtipuro1234
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Controlsethnainaa
 
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingReading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingArtemisa Yescas Engler
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxsarah david
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experiencedzynofustechnology
 

Similar to The Complete Web Application Security Testing Checklist (20)

Testing overview
Testing overviewTesting overview
Testing overview
 
Basic interview questions for manual testing
Basic interview questions for manual testingBasic interview questions for manual testing
Basic interview questions for manual testing
 
Manual testing
Manual testingManual testing
Manual testing
 
Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3Learn software testing with tech partnerz 3
Learn software testing with tech partnerz 3
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
 
Manual
ManualManual
Manual
 
Why software testing is very important for banking applications?
Why software testing is very important for banking applications?Why software testing is very important for banking applications?
Why software testing is very important for banking applications?
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2
 
Glimpse and Benefits of Testing
Glimpse and Benefits of TestingGlimpse and Benefits of Testing
Glimpse and Benefits of Testing
 
Implementing a testing strategy
Implementing a testing strategyImplementing a testing strategy
Implementing a testing strategy
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
M. Holovaty, Концепции автоматизированного тестирования
M. Holovaty, Концепции автоматизированного тестированияM. Holovaty, Концепции автоматизированного тестирования
M. Holovaty, Концепции автоматизированного тестирования
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
IRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software Testing
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Control
 
Test Management Montioring Control
Test Management Montioring ControlTest Management Montioring Control
Test Management Montioring Control
 
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingReading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experienced
 

More from Cigital

7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMMCigital
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat ModelingCigital
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Cigital
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCigital
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling MisconceptionsCigital
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game SecurityCigital
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security MetricsCigital
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Cigital
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotCigital
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCigital
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?Cigital
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application SecurityCigital
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The NumbersCigital
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityCigital
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelCigital
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams Cigital
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsCigital
 

More from Cigital (19)

7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 
Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!Handle With Care: You Have My VA Report!
Handle With Care: You Have My VA Report!
 
Can You Really Automate Yourself Secure
Can You Really Automate Yourself SecureCan You Really Automate Yourself Secure
Can You Really Automate Yourself Secure
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions6 Most Common Threat Modeling Misconceptions
6 Most Common Threat Modeling Misconceptions
 
Video Game Security
Video Game SecurityVideo Game Security
Video Game Security
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin? Software Security Initiative Capabilities: Where Do I Begin?
Software Security Initiative Capabilities: Where Do I Begin?
 
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind SpotStatic Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
 
Cyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass HousesCyber War, Cyber Peace, Stones, and Glass Houses
Cyber War, Cyber Peace, Stones, and Glass Houses
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?SAST vs. DAST: What’s the Best Method For Application Security Testing?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
 
The Path to Proactive Application Security
The Path to Proactive Application SecurityThe Path to Proactive Application Security
The Path to Proactive Application Security
 
BSIMM By The Numbers
BSIMM By The NumbersBSIMM By The Numbers
BSIMM By The Numbers
 
BSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software SecurityBSIMM: Bringing Science to Software Security
BSIMM: Bringing Science to Software Security
 
BSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity ModelBSIMM-V: The Building Security In Maturity Model
BSIMM-V: The Building Security In Maturity Model
 
5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams 5 Models for Enterprise Software Security Management Teams
5 Models for Enterprise Software Security Management Teams
 
How to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security FlawsHow to Avoid the Top Ten Software Security Flaws
How to Avoid the Top Ten Software Security Flaws
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

The Complete Web Application Security Testing Checklist

  • 1. Get on-demand access to hundreds of security experts and premium testing tools with Cigital’s Managed Services. Learn more at www.Cigital.com Web Application Security Web Application Security Testing Checklist Testing Checklist Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery mechanism for both consumer-grade and business-critical functionality these days. As a result, the web is also the most common target for application-level attacks. To prevent any web application security oversights, use this checklist to guide you through the necessary steps to ensure your penetration tests are effective, efficient, and timely. Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery mechanism for both consumer-grade and business-critical functionality these days. As a result, the web is also the most common target for application-level attacks. To prevent any web application security oversights, use this checklist to guide you through the necessary steps to ensure your penetration tests are effective, efficient, and timely. This is required in case of lockouts and/or multiple team member access. Request an understanding of the permissions/role structure. Gather two credentials for each. This includes areas that require manual testing specifically focused on bypassing, escalation, and sensitive data disclosure techniques. Business logic flow can be defined as the data flow specific, and unique, to the application. This type of functionality is often overlooked with automated analysis. For example Functionality may include an approval workflow or privileged account access. A tester must ensure: • Integrity of the workflow • Users can’t bypass or skips steps • Users can’t perform privileged activities without authorization Construct business logic and data flow. This includes areas where users are able to add, modify, and/or delete content. These locations require verification of input sanitization and output encoding. For example Applications that allow users to enter large amounts of data such as blog posts, especially when done through HTML editors, are at high risk of injection attacks if proper prevention mechanisms aren’t enforced. Determine highly problematic areas of the application. Ask the appropriate questions in order to properly plan and test the application at hand. Step 1. Information GatheringStep 1. Information Gathering Step 2. PlanningStep 2. Planning This is the point when you should write the report. Establish the “stop testing” deadline at which point the team will document all vulnerabilities. Assign an individual to configure and scan. Determine the types of automated tests to be performed. The application should be split amongst team members by functionality or vulnerability type, depending on expertise. Assign specific roles and credentials to each team member (if working as a team). If the application performs authentication, the following checks are applicable (not exhaustive): Session management Brute forcing Privilege escalation Password complexity Organize the types of vulnerabilities applicable for this type of application. Document your testing strategy to ensure each assessor knows what they’re working on and how much time they have to complete testing-related tasks. Internal status calls should take place twice a week and include the testers and the project/client manager. External status calls should take place once a week and include the internal team and the customer(s). If possible, the project manager should walk through team status and then pass to team members for details. Set up status calls internally and externally. This should be done only when the client requests it. Document specific test cases. If required within the terms of the contract. This aids in the execution phase and provides details on scope if any adjustments need to be made. Perform automated and/or manual crawling. Clients may request an output of tests performed even if vulnerabilities aren’t identified. Document and collect artifacts when vulnerabilities are discovered. Manual tasks cover business logic and dataflow specific to the application that are typically overlooked by automation. A manual test may look like the following: 1. A tester identifies a URL accessed by an admin that is slightly different from what they see https://www.example.com/users/edit?id=123456&admin=false 2. They modify the URL in an attempt to act as an admin https://www.example.com/users/edit?id=123456&admin=true 3. Depending on the result, a vulnerability should be documented and the tester should navigate to similar pages to see if this issue is persistent. Most tools send several requests to the same page to determine if the responses are different. Many tools state that a vulnerability exists when HTTP 500 errors are returned. It is the tester’s responsibility to review the request and the error message to determine if a vulnerability actually occurs. Perform manual tests. Automation tools should be carefully selected (cover common OWASP Top 10 vulnerabilities at a minimum). This allows testers to focus their skills on the business logic and data flow requiring manual analysis. Automated testing differs slightly per organization depending on what tools are licensed and/or internally built. Perform automated tests and triage the results. Conduct tests and discover vulnerabilities (if any exist). Step 3. ExecutionStep 3. Execution Step 4. ReportingStep 4. Reporting This ensures that consistency, aesthetics, and technical writing remains intact. Conduct technical review of final reports. (If requested by client.) Review the results and make any appropriate adjustments based on the conversation. Perform a “report out” call. This should include descriptions, instances (affected URLs), roles, evidence, steps to reproduce, likelihood, impact, and remediation. Formalize results. Document results thoroughly and report to the client. It is the application owner’s responsibility to task a developer with specific remediation tasks. It is important to apply fixes in all similar locations of the code. Black box test may not be exhaustive and similar issues could exist. Address and follow the remediation guidelines in the report. Address the vulnerabilities discovered during testing. Step 5. RemediationStep 5. Remediation Step 6. VerificationStep 6. Verification Perform filter evasion techniques for XSS, attempt escalation attacks with different roles, and perform redirects to different URLs. Ensure the fixes prevent “transformed” attempts at the same vulnerability. Look for specific previously identified issues. Review the application again. Confirm that the vulnerabilities found during testing are resolved and ensure the fixes can’t be evaded. The CompleteThe Complete