Web Pentesting
The website contains lots of components and functionality, testing them can be frustrating and time consuming. I have been in a situation where I have to decide from where to start the test or forgot to test some of the areas or vulnerabilities in website. So, here I have created the simple cheatsheet for pentesting the website with some references to tools, websites and wordlists.
Cheatsheet
Directories and Pages enumeration
Enumerate the visible directories and pages.
Enumerate or test all the features available in page and functionality of buttons.
Gather their clients and their team members information form testimonial or about us section or page if available.
Gather the contact information like address, email addresses or contact number.
Test .git directory and robot.txt, which can be leaked.
Source code review
Check for comments in the source code which could reveal or give us some information.
Check for
metadata
,script
andlink
tag which could reveal the use third-party libraries, dependencies, frameworks etc.If code is not obfuscated, try to understand the code and its functionality.
Check all the scripts and assets linked to the source code.
Identifying technologies and finding its vulnerabilities
The technologies used can be identified via source code.
The
whatweb
cli and wappalyzer plugins can be used for identifying technologies used.The 404 page can be used to identify the frameworks used in the website. The 0xdf has created the 404 page cheatsheet for identifying the frameworks.
If the technologies used is an open-source project, head over to its github or gitlab repository and in security tab its vulnerabilities will we listed.
Use
searchsploit
cli, synk, cvedetails or any other website or tools where we can find it's vulnearbilities and PoC's.
Finding exploits
The script for certain PoC's is published in github or gitlab.
The searchsploit or exploit-db contains the scripts for exploitation's certain CVE's vulnerabilities.
The open-source libraries or frameworks vulnerabilities and PoC's which is used in website can be found in the security tab in github or gitlab repository.
The metasploit frameworks contains the lots of exploits which can be used during pentesting.
References
Tools
Fuzzing - ffuf, dirsearch, gobuster, feroxbuster.
Finding vulnerability - searchsploit, wpscan.
Exploitation - sqlmap, metasploit.
Websites
exploit-db - Contains the scripts for exploiting vulnerabilities.
cvedetails, snyk, vulners - Contains the details of published CVE's.
Wordlists
Seclists - The wordlist which can be used for directory, pages, sub-domain and vhost fuzzing.
Rockyou - The wordlist which can be used for brute forcing and directory-attacks.
Happy Pentesting
Last updated