Checklist bug hunting

Februari 28, 2024


 

 

Perlunya sebuah catatan checklist bagi seorang pentester agar tidak terlewat dalam melakukan kegiatan pentesting bug hunting pada web atau sebuah aplikasi web,  sehingga dapat melakukkan pemetaan dan ataupun memudahkan pencarian serata menemukan bug pada suatu target lebih cepat dan terstruktur, berikut dibawah sedikit checklist yang dapat dimanfaatkan bagi kita untuk melakukan aktifitas pentesting atau bug hunting.

 

 Checklist: Bug bounty exploit checklist

1. Information gathering:

2. Authentication and authorization:

3. Input validation and output encoding:

  • Test for Cross-site Scripting (XSS), both reflected and stored
  • Test for SQL Injection (SQLi) and other injection vulnerabilities (e.g., command, LDAP, XPath)
  • Test for XML External Entity (XXE) attacks
  • Check for Open Redirect vulnerabilities
  • Test for insecure deserialization vulnerabilities

4. Business logic vulnerabilities:

5. Server-side vulnerabilities:

  • Test for server-side vulnerabilities like remote code execution (RCE), local file inclusion (LFI), and remote file inclusion (RFI)
  • Test for Server-Side Request Forgery (SSRF) vulnerabilities
  • Check for server misconfigurations, including weak TLS/SSL cipher suites, insecure HTTP headers, and exposed error messages
  • Test for path traversal vulnerabilities
  • 6. Client-side vulnerabilities:
  • Test for Cross-Site Request Forgery (CSRF) vulnerabilities
  • Examine JavaScript code for vulnerabilities (e.g., client-side validation, DOM-based XSS)
  • Check for Clickjacking and other UI redressing attacks
  • Test for HTML5 postMessage vulnerabilities
7. Web APIs:
  • Enumerate API endpoints and methods
  • Test for authentication, authorization, and rate limiting issues
  • Check for parameter tampering and injection vulnerabilities
  • Test for improper handling of data formats (e.g., JSON, XML)

8. Third-party components and integrations:

  • Check for vulnerabilities in third-party libraries, plugins, or themes
  • Test for OAuth misconfigurations and other issues related to Single Sign-On (SSO)
  • Review APIs and other integrations for proper security configurations

9. Mobile application components:

  • Test for insecure communication between mobile apps and web servers
  • Check for mobile-specific issues such as insecure storage of sensitive data
  • Assess mobile app-specific vulnerabilities, like deep linking or WebView issues

10. Misconfigurations and insecure defaults:

  • Check for exposed administrative interfaces or developer portals
  • Test for weak or misconfigured security headers
  • Look for vulnerable versions of web servers, databases, or other components
  • Examine cookie configurations, such as missing HttpOnly or Secure flags

11. Cryptography-related vulnerabilities:

  1. Test for weak encryption or hashing algorithms
  2. Check for improper usage of encryption libraries
  3. Assess the application for issues like padding oracle attacks
  4. Look for hardcoded keys or secrets in the application's code

12. Data exposure and privacy issues:

  • Check for sensitive data leakage in HTTP responses, logs, or error messages
  • Test for unprotected access to user profile data or personally identifiable information (PII)
  • Verify the proper handling of user consent and privacy-related features
  • 13. Network and infrastructure-level vulnerabilities:
  • Test for vulnerabilities in supporting infrastructure, like misconfigured DNS or load balancers
  • Scan the network for open ports or other exposed services
  • Check for firewall bypass vulnerabilities, such as DNS rebinding attacks

14. Container and orchestration-related vulnerabilities:

  • Assess the security of container images and configurations
  • Check for misconfigurations in container orchestration platforms, like Kubernetes or Docker Swarm
  • Look for exposed secrets, insecure defaults, or other vulnerabilities in containerized environments

15. Code quality and vulnerability management:

  • Review the application's code for insecure coding practices or patterns
  • Look for potential vulnerabilities introduced by third-party code or dependencies
  • Examine the application's use of open-source software and the associated security risks

 

Itu tadi beberapa checklist yang dapat digunakan untuk pentesting jika ingin digunakan untuk mencari bug pada target. coba satu-persatu  hingga mendapatkan suatu kelemahan yang dapat di eskalasi ke tahap yang lebih tinggi.

Share this :

Previous
Next Post »
0 Komentar

Penulisan markup di komentar
  • Silakan tinggalkan komentar sesuai topik. Komentar yang menyertakan link aktif, iklan, atau sejenisnya akan dihapus.
  • Untuk menyisipkan kode gunakan <i rel="code"> kode yang akan disisipkan </i>
  • Untuk menyisipkan kode panjang gunakan <i rel="pre"> kode yang akan disisipkan </i>
  • Untuk menyisipkan quote gunakan <i rel="quote"> catatan anda </i>
  • Untuk menyisipkan gambar gunakan <i rel="image"> URL gambar </i>
  • Untuk menyisipkan video gunakan [iframe] URL embed video [/iframe]
  • Kemudian parse kode tersebut pada kotak di bawah ini
  • © 2015 Simple SEO ✔