Testing Methodology
Introduction to web application security penetration testing.
Process Breakdown
Stage 1: Enumeration
Stage 2: Assessment
Stage 3: Exploitation
Stage 4: Deliverable
Stage 1: Enumeration
Server and Client Technologies.
Software Versions.
Application Structure.
Common Configuration Practices.
Stage 2: Assessment
Finding vulnerabilities by brute force.
Finding vulnerabilities by fuzzing.
Finding vulnerabilities manually.
Complex Input Validation Problems.
Logic Flaws.
Stage 3: Exploitation
Prove that the target is vulnerable.
Measure attack effectiveness.
Ease of Exploitability.
Attack Likelihood.
Mitigation Controls.
Stage 4: Deliverable
Document findings.
Discuss mitigations.
Provide examples.
Assessment Methodology
1. Authentication.
2. Session Management.
3. Access Control.
4. Data Transport.
5. Server Tier.
6. Data Storage.
7. Logging.
8. Business Logic.
9. Data Validation.

Web Application Security 101 - 04 Testing Methodology