Web Pentesting
Last updated
Last updated
The website contains lots of components and functionality, testing them can be frustrating and time consuming. I have been in a situation where I have to decide from where to start the test or forgot to test some of the areas or vulnerabilities in website. So, here I have created the simple cheatsheet for pentesting the website with some references to tools, websites and wordlists.
Enumerate the visible directories and pages.
Enumerate or test all the features available in page and functionality of buttons.
Gather their clients and their team members information form testimonial or about us section or page if available.
Gather the contact information like address, email addresses or contact number.
Test .git directory and robot.txt, which can be leaked.
Check for comments in the source code which could reveal or give us some information.
Check for metadata
, script
and link
tag which could reveal the use third-party libraries, dependencies, frameworks etc.
If code is not obfuscated, try to understand the code and its functionality.
Check all the scripts and assets linked to the source code.
The technologies used can be identified via source code.
The whatweb
cli and wappalyzer plugins can be used for identifying technologies used.
The 404 page can be used to identify the frameworks used in the website. The 0xdf has created the 404 page for identifying the frameworks.
If the technologies used is an open-source project, head over to its github or gitlab repository and in security tab its vulnerabilities will we listed.
Use searchsploit
cli, synk, cvedetails or any other website or tools where we can find it's vulnearbilities and PoC's.
The script for certain PoC's is published in github or gitlab.
The searchsploit or exploit-db contains the scripts for exploitation's certain CVE's vulnerabilities.
The open-source libraries or frameworks vulnerabilities and PoC's which is used in website can be found in the security tab in github or gitlab repository.
The metasploit frameworks contains the lots of exploits which can be used during pentesting.
Fuzzing - , , , .
Intercepting request - , .
Finding technologies - , [ plugin ]
Finding vulnerability - , .
Exploitation - , .
- Contains the scripts for exploiting vulnerabilities.
, , - Contains the details of published CVE's.
- The wordlist which can be used for directory, pages, sub-domain and vhost fuzzing.
- The wordlist which can be used for brute forcing and directory-attacks.