SlideShare a Scribd company logo
Get on-demand access to hundreds of security experts and premium testing tools with Cigital’s Managed Services.
Learn more at www.Cigital.com
Web Application Security
Web Application Security
Testing Checklist
Testing Checklist
Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery
mechanism for both consumer-grade and business-critical functionality these days.
As a result, the web is also the most common target for application-level attacks.
To prevent any web application security oversights, use this checklist to guide you
through the necessary steps to ensure your penetration tests are effective, efficient,
and timely.
Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery
mechanism for both consumer-grade and business-critical functionality these days.
As a result, the web is also the most common target for application-level attacks.
To prevent any web application security oversights, use this checklist to guide you
through the necessary steps to ensure your penetration tests are effective, efficient,
and timely.
This is required in case of lockouts and/or multiple team member access.
Request an understanding of the permissions/role structure.
Gather two credentials for each.
This includes areas that require manual testing specifically focused on bypassing,
escalation, and sensitive data disclosure techniques. Business logic flow can be defined
as the data flow specific, and unique, to the application. This type of functionality is
often overlooked with automated analysis.
For example
Functionality may include an approval workflow or privileged account access.
A tester must ensure:
• Integrity of the workflow
• Users can’t bypass or skips steps
• Users can’t perform privileged activities without authorization
Construct business logic and data flow.
This includes areas where users are able to add, modify, and/or delete
content. These locations require verification of input sanitization and output encoding.
For example
Applications that allow users to enter large amounts of data such as blog posts,
especially when done through HTML editors, are at high risk of injection attacks
if proper prevention mechanisms aren’t enforced.
Determine highly problematic areas of the application.
Ask the appropriate questions in order to properly plan and test the application at hand.
Step 1. Information GatheringStep 1. Information Gathering
Step 2. PlanningStep 2. Planning
This is the point when you should write the report.
Establish the “stop testing” deadline at which point the team
will document all vulnerabilities.
Assign an individual to configure and scan.
Determine the types of automated tests to be performed.
The application should be split amongst team members by functionality or
vulnerability type, depending on expertise.
Assign specific roles and credentials to each team member
(if working as a team).
If the application performs authentication, the following checks are applicable
(not exhaustive):
Session management
Brute forcing
Privilege escalation
Password complexity
Organize the types of vulnerabilities applicable for this type
of application.
Document your testing strategy to ensure each assessor knows what they’re working on
and how much time they have to complete testing-related tasks.
Internal status calls should take place twice a week and include the testers
and the project/client manager. External status calls should take place
once a week and include the internal team and the customer(s). If possible,
the project manager should walk through team status and then pass to team
members for details.
Set up status calls internally and externally.
This should be done only when the client requests it.
Document specific test cases.
If required within the terms of the contract. This aids in the execution phase
and provides details on scope if any adjustments need to be made.
Perform automated and/or manual crawling.
Clients may request an output of tests performed even if vulnerabilities
aren’t identified.
Document and collect artifacts when vulnerabilities
are discovered.
Manual tasks cover business logic and dataflow specific to the application that are
typically overlooked by automation. A manual test may look like the
following:
1. A tester identifies a URL accessed by an admin that is slightly different from
what they see
https://www.example.com/users/edit?id=123456&admin=false
2. They modify the URL in an attempt to act as an admin
https://www.example.com/users/edit?id=123456&admin=true
3. Depending on the result, a vulnerability should be documented and the
tester should navigate to similar pages to see if this issue is persistent.
Most tools send several requests to the same page to determine if the responses
are different. Many tools state that a vulnerability exists when HTTP 500 errors
are returned. It is the tester’s responsibility to review the request and the error
message to determine if a vulnerability actually occurs.
Perform manual tests.
Automation tools should be carefully selected (cover common OWASP Top 10
vulnerabilities at a minimum). This allows testers to focus their skills on the
business logic and data flow requiring manual analysis. Automated testing
differs slightly per organization depending on what tools are licensed and/or
internally built.
Perform automated tests and triage the results.
Conduct tests and discover vulnerabilities (if any exist).
Step 3. ExecutionStep 3. Execution
Step 4. ReportingStep 4. Reporting
This ensures that consistency, aesthetics, and technical writing remains intact.
Conduct technical review of final reports.
(If requested by client.) Review the results and make any appropriate adjustments
based on the conversation.
Perform a “report out” call.
This should include descriptions, instances (affected URLs), roles, evidence, steps to
reproduce, likelihood, impact, and remediation.
Formalize results.
Document results thoroughly and report to the client.
It is the application owner’s responsibility to task a developer with specific
remediation tasks. It is important to apply fixes in all similar locations of the code.
Black box test may not be exhaustive and similar issues could exist.
Address and follow the remediation guidelines in the report.
Address the vulnerabilities discovered during testing.
Step 5. RemediationStep 5. Remediation
Step 6. VerificationStep 6. Verification
Perform filter evasion techniques for XSS, attempt escalation attacks with different
roles, and perform redirects to different URLs.
Ensure the fixes prevent “transformed” attempts at the same
vulnerability.
Look for specific previously identified issues.
Review the application again.
Confirm that the vulnerabilities found during testing are resolved and ensure
the fixes can’t be evaded.
The CompleteThe Complete

More Related Content

PPT
Get Ready for Web Application Security Testing
PDF
Testing Web Application Security
PPTX
Security testing
PPTX
Security Testing Training With Examples
PPTX
Security Testing for Web Application
PPTX
Security testing
PPT
Step by step guide for web application security testing
PDF
Security testing presentation
Get Ready for Web Application Security Testing
Testing Web Application Security
Security testing
Security Testing Training With Examples
Security Testing for Web Application
Security testing
Step by step guide for web application security testing
Security testing presentation

What's hot (20)

PPS
Security testing
PDF
Security-testing presentation
PDF
Introduction to Security Testing
PDF
Web Application Security 101 - 04 Testing Methodology
PPTX
PDF
Introduction to Application Security Testing
PDF
Web Application Security Testing Tools
PDF
PPT
Introduction to Web Application Penetration Testing
PPT
Security Testing
PPTX
A7 Missing Function Level Access Control
PPT
Web Application Security Testing
PPTX
Web Application Penetration Testing Introduction
PPTX
Owasp first5 presentation
PPTX
Web application vulnerability assessment
PPTX
OTG - Practical Hands on VAPT
PPT
Web Application Security
PPTX
Introduction to security testing
PPT
Security testing
PDF
Web Application Security 101
Security testing
Security-testing presentation
Introduction to Security Testing
Web Application Security 101 - 04 Testing Methodology
Introduction to Application Security Testing
Web Application Security Testing Tools
Introduction to Web Application Penetration Testing
Security Testing
A7 Missing Function Level Access Control
Web Application Security Testing
Web Application Penetration Testing Introduction
Owasp first5 presentation
Web application vulnerability assessment
OTG - Practical Hands on VAPT
Web Application Security
Introduction to security testing
Security testing
Web Application Security 101
Ad

Viewers also liked (20)

PPTX
MS HALL-Quiz-IIT KGP
PPTX
Secure coding practices
PDF
Secure Coding - Web Application Security Vulnerabilities and Best Practices
PPTX
Secure coding practices
PDF
Hyper-Efficient Mac Deployment
PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PPTX
visie op talentontwikkeling in het mbo
PPTX
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
DOCX
PPTX
SafeCare in Israel
PDF
Gurushant H Portfolio
PPTX
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
PPTX
A retrospective service evaluation of safeguarding activity in a dental gener...
PPT
Disabled young people's perspectives of the child protection system in England
PPTX
Omar presentation2
PPTX
How to Improve Singing Voice Quality Training & Transformation Tips
PPTX
"I couldn't keep it from her... she's my friend":
DOCX
Warehouse
DOCX
Curriculum Vitae
DOC
Gaurav Resume
MS HALL-Quiz-IIT KGP
Secure coding practices
Secure Coding - Web Application Security Vulnerabilities and Best Practices
Secure coding practices
Hyper-Efficient Mac Deployment
Get Your Board to Say "Yes" to a BSIMM Assessment
visie op talentontwikkeling in het mbo
arn to Sing Better Fast with 5 Quick Fixes for Your Voice Tips
SafeCare in Israel
Gurushant H Portfolio
Approaching Alternative Care Through an Emphatic Lens - The Incredible Years ...
A retrospective service evaluation of safeguarding activity in a dental gener...
Disabled young people's perspectives of the child protection system in England
Omar presentation2
How to Improve Singing Voice Quality Training & Transformation Tips
"I couldn't keep it from her... she's my friend":
Warehouse
Curriculum Vitae
Gaurav Resume
Ad

Similar to The Complete Web Application Security Testing Checklist (20)

DOCX
Web App Penetration Testing Essential Strategies for a Secure Pentest Website...
PPTX
Application security in a hurry webinar
PDF
Security Testing Approach for Web Application Testing.pdf
PDF
Web Application Security Testing Guide | Secure Web Apps
PDF
OWASP-Web-Security-testing-4.2
PDF
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
PDF
(Ebook) Web security testing guide by elie saad, rick mitchell
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPTX
How to Get the Most Out of Security Tools
PPTX
Web applications security conference slides
PDF
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
PDF
ProActive Security
PDF
ProActive Security
KEY
How to break web applications
PDF
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
PPTX
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
PPTX
Application Security TRENDS – Lessons Learnt- Firosh Ummer
PDF
Application Security - Your Success Depends on it
PDF
Web Application Testing by Calidad Infotech
PPTX
DEF CON 23 - Hacking Web Apps @brentwdesign
Web App Penetration Testing Essential Strategies for a Secure Pentest Website...
Application security in a hurry webinar
Security Testing Approach for Web Application Testing.pdf
Web Application Security Testing Guide | Secure Web Apps
OWASP-Web-Security-testing-4.2
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
(Ebook) Web security testing guide by elie saad, rick mitchell
Essentials of Web Application Security: what it is, why it matters and how to...
How to Get the Most Out of Security Tools
Web applications security conference slides
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
ProActive Security
ProActive Security
How to break web applications
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Application Security - Your Success Depends on it
Web Application Testing by Calidad Infotech
DEF CON 23 - Hacking Web Apps @brentwdesign

More from Cigital (19)

PDF
7 Lessons Learned From BSIMM
PPTX
Secure Design: Threat Modeling
PDF
Getting Executive Support for a Software Security Program
PPTX
Handle With Care: You Have My VA Report!
PPTX
Can You Really Automate Yourself Secure
PPTX
How to Choose the Right Security Training for You
PPTX
6 Most Common Threat Modeling Misconceptions
PPTX
Video Game Security
PPTX
Software Security Metrics
PPTX
Software Security Initiative Capabilities: Where Do I Begin?
PPTX
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
The Path to Proactive Application Security
PDF
BSIMM By The Numbers
PPTX
BSIMM: Bringing Science to Software Security
PPTX
BSIMM-V: The Building Security In Maturity Model
PPT
5 Models for Enterprise Software Security Management Teams
PPT
How to Avoid the Top Ten Software Security Flaws
7 Lessons Learned From BSIMM
Secure Design: Threat Modeling
Getting Executive Support for a Software Security Program
Handle With Care: You Have My VA Report!
Can You Really Automate Yourself Secure
How to Choose the Right Security Training for You
6 Most Common Threat Modeling Misconceptions
Video Game Security
Software Security Metrics
Software Security Initiative Capabilities: Where Do I Begin?
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Cyber War, Cyber Peace, Stones, and Glass Houses
SAST vs. DAST: What’s the Best Method For Application Security Testing?
The Path to Proactive Application Security
BSIMM By The Numbers
BSIMM: Bringing Science to Software Security
BSIMM-V: The Building Security In Maturity Model
5 Models for Enterprise Software Security Management Teams
How to Avoid the Top Ten Software Security Flaws

Recently uploaded (20)

PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Nekopoi APK 2025 free lastest update
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
Introduction to Artificial Intelligence
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Design an Analysis of Algorithms I-SECS-1021-03
Understanding Forklifts - TECH EHS Solution
VVF-Customer-Presentation2025-Ver1.9.pptx
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Nekopoi APK 2025 free lastest update
Upgrade and Innovation Strategies for SAP ERP Customers
ManageIQ - Sprint 268 Review - Slide Deck
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
L1 - Introduction to python Backend.pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How Creative Agencies Leverage Project Management Software.pdf
Transform Your Business with a Software ERP System
Navsoft: AI-Powered Business Solutions & Custom Software Development

The Complete Web Application Security Testing Checklist

  • 1. Get on-demand access to hundreds of security experts and premium testing tools with Cigital’s Managed Services. Learn more at www.Cigital.com Web Application Security Web Application Security Testing Checklist Testing Checklist Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery mechanism for both consumer-grade and business-critical functionality these days. As a result, the web is also the most common target for application-level attacks. To prevent any web application security oversights, use this checklist to guide you through the necessary steps to ensure your penetration tests are effective, efficient, and timely. Web applications are ubiquitous and plentiful. In fact, the web is the de facto delivery mechanism for both consumer-grade and business-critical functionality these days. As a result, the web is also the most common target for application-level attacks. To prevent any web application security oversights, use this checklist to guide you through the necessary steps to ensure your penetration tests are effective, efficient, and timely. This is required in case of lockouts and/or multiple team member access. Request an understanding of the permissions/role structure. Gather two credentials for each. This includes areas that require manual testing specifically focused on bypassing, escalation, and sensitive data disclosure techniques. Business logic flow can be defined as the data flow specific, and unique, to the application. This type of functionality is often overlooked with automated analysis. For example Functionality may include an approval workflow or privileged account access. A tester must ensure: • Integrity of the workflow • Users can’t bypass or skips steps • Users can’t perform privileged activities without authorization Construct business logic and data flow. This includes areas where users are able to add, modify, and/or delete content. These locations require verification of input sanitization and output encoding. For example Applications that allow users to enter large amounts of data such as blog posts, especially when done through HTML editors, are at high risk of injection attacks if proper prevention mechanisms aren’t enforced. Determine highly problematic areas of the application. Ask the appropriate questions in order to properly plan and test the application at hand. Step 1. Information GatheringStep 1. Information Gathering Step 2. PlanningStep 2. Planning This is the point when you should write the report. Establish the “stop testing” deadline at which point the team will document all vulnerabilities. Assign an individual to configure and scan. Determine the types of automated tests to be performed. The application should be split amongst team members by functionality or vulnerability type, depending on expertise. Assign specific roles and credentials to each team member (if working as a team). If the application performs authentication, the following checks are applicable (not exhaustive): Session management Brute forcing Privilege escalation Password complexity Organize the types of vulnerabilities applicable for this type of application. Document your testing strategy to ensure each assessor knows what they’re working on and how much time they have to complete testing-related tasks. Internal status calls should take place twice a week and include the testers and the project/client manager. External status calls should take place once a week and include the internal team and the customer(s). If possible, the project manager should walk through team status and then pass to team members for details. Set up status calls internally and externally. This should be done only when the client requests it. Document specific test cases. If required within the terms of the contract. This aids in the execution phase and provides details on scope if any adjustments need to be made. Perform automated and/or manual crawling. Clients may request an output of tests performed even if vulnerabilities aren’t identified. Document and collect artifacts when vulnerabilities are discovered. Manual tasks cover business logic and dataflow specific to the application that are typically overlooked by automation. A manual test may look like the following: 1. A tester identifies a URL accessed by an admin that is slightly different from what they see https://www.example.com/users/edit?id=123456&admin=false 2. They modify the URL in an attempt to act as an admin https://www.example.com/users/edit?id=123456&admin=true 3. Depending on the result, a vulnerability should be documented and the tester should navigate to similar pages to see if this issue is persistent. Most tools send several requests to the same page to determine if the responses are different. Many tools state that a vulnerability exists when HTTP 500 errors are returned. It is the tester’s responsibility to review the request and the error message to determine if a vulnerability actually occurs. Perform manual tests. Automation tools should be carefully selected (cover common OWASP Top 10 vulnerabilities at a minimum). This allows testers to focus their skills on the business logic and data flow requiring manual analysis. Automated testing differs slightly per organization depending on what tools are licensed and/or internally built. Perform automated tests and triage the results. Conduct tests and discover vulnerabilities (if any exist). Step 3. ExecutionStep 3. Execution Step 4. ReportingStep 4. Reporting This ensures that consistency, aesthetics, and technical writing remains intact. Conduct technical review of final reports. (If requested by client.) Review the results and make any appropriate adjustments based on the conversation. Perform a “report out” call. This should include descriptions, instances (affected URLs), roles, evidence, steps to reproduce, likelihood, impact, and remediation. Formalize results. Document results thoroughly and report to the client. It is the application owner’s responsibility to task a developer with specific remediation tasks. It is important to apply fixes in all similar locations of the code. Black box test may not be exhaustive and similar issues could exist. Address and follow the remediation guidelines in the report. Address the vulnerabilities discovered during testing. Step 5. RemediationStep 5. Remediation Step 6. VerificationStep 6. Verification Perform filter evasion techniques for XSS, attempt escalation attacks with different roles, and perform redirects to different URLs. Ensure the fixes prevent “transformed” attempts at the same vulnerability. Look for specific previously identified issues. Review the application again. Confirm that the vulnerabilities found during testing are resolved and ensure the fixes can’t be evaded. The CompleteThe Complete