<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Frank.catucci</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Frank.catucci"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Frank.catucci"/>
		<updated>2026-05-08T13:06:59Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249742</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249742"/>
				<updated>2019-04-05T14:18:36Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - Thursday March 28th 2019 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-59027002353&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS'''&lt;br /&gt;
&lt;br /&gt;
As usual the cost is absolutely nothing! There will also be some hacker trivia with a few giveaways! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presentation from March 28th 2019 on &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS&amp;quot; --&amp;gt;''' [https://drive.google.com/file/d/1LOMRKgFf9mvKHwVQjZKej70XEhU7-sVe/view?usp=sharing Cover Your XSS: Attacks in Appland - Exploring the World of XSS]  &lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249741</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249741"/>
				<updated>2019-04-05T14:14:21Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - Thursday March 28th 2019 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-59027002353&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS'''&lt;br /&gt;
&lt;br /&gt;
As usual the cost is absolutely nothing! There will also be some hacker trivia with a few giveaways! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
[[File:Covering XSS Attacks - OWASP-Columbia-Spring-Meetup.pdf.png|thumb]]&lt;br /&gt;
'''Presentation from March 28th 2019 on &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS&amp;quot; ---------------------------------------------------------------------------------&amp;gt;'''  &lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249739</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=249739"/>
				<updated>2019-04-05T14:11:43Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - Thursday March 28th 2019 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-59027002353&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS'''&lt;br /&gt;
&lt;br /&gt;
As usual the cost is absolutely nothing! There will also be some hacker trivia with a few giveaways! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
[[File:Covering XSS Attacks - OWASP-Columbia-Spring-Meetup.pdf.png|thumb]]&lt;br /&gt;
'''Presentation from March 28th 2019 on &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS&amp;quot; ----------------------------------------------------------------------------------&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Covering_XSS_Attacks_-_OWASP-Columbia-Spring-Meetup.pdf.png&amp;diff=249738</id>
		<title>File:Covering XSS Attacks - OWASP-Columbia-Spring-Meetup.pdf.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Covering_XSS_Attacks_-_OWASP-Columbia-Spring-Meetup.pdf.png&amp;diff=249738"/>
				<updated>2019-04-05T14:10:51Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Covering XSS Attacks - OWASP-Columbia-Spring-Meetup.pdf&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Covering_XSS_Attacks_-_OWASP-Columbia-Spring-Meetup.pdf&amp;diff=249737</id>
		<title>File:Covering XSS Attacks - OWASP-Columbia-Spring-Meetup.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Covering_XSS_Attacks_-_OWASP-Columbia-Spring-Meetup.pdf&amp;diff=249737"/>
				<updated>2019-04-05T14:07:41Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;March 28th 2019 - Covering XSS Attacks&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=248961</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=248961"/>
				<updated>2019-03-19T16:53:29Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - Thursday March 28th 2019 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-59027002353&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: &amp;quot;Cover Your XSS: Attacks in Appland&amp;quot; - Exploring the World of XSS'''&lt;br /&gt;
&lt;br /&gt;
As usual the cost is absolutely nothing! There will also be some hacker trivia with a few giveaways! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; [http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=245920</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=245920"/>
				<updated>2018-12-10T21:47:52Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: meeting info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - WEDNESDAY DECEMBER 19th 2018 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-53550669494&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: OWASP Meet and Greet and Hacker/AppSec Jeopardy!'''&lt;br /&gt;
&lt;br /&gt;
As usual the cost is absolutely nothing! There will also be some hacker trivia with a few giveaways! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; [http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=240870</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=240870"/>
				<updated>2018-05-22T16:05:17Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - THURSDAY June 7th 2018 - Register Now -&amp;gt;''' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-46323138755&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: XXE - XML External Entity Processing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Frank Catucci will be delivering an introduction and overview of XXE including the how and why it got into the all new OWASP Top 10. XXE exploitation and prevention methods will also be discussed. Q&amp;amp;A is welcome. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; [http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=240786</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=240786"/>
				<updated>2018-05-18T19:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: Meeting info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - THURSDAY June 7th 2018 - Register Now -&amp;gt; Eventbrite link to register coming soon!'''&lt;br /&gt;
&lt;br /&gt;
'''TOPIC: XXE - XML External Entity Processing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Frank Catucci will be delivering an introduction and overview of XXE including the how and why it got into the all new OWASP Top 10. XXE exploitation and prevention methods will also be discussed. Q&amp;amp;A is welcome. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; [http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=235884</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=235884"/>
				<updated>2017-11-30T14:42:22Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''NEXT MEETING - THURSDAY DECEMBER 7th 2017 - Register Now -&amp;gt; https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-40902614822'''&lt;br /&gt;
&lt;br /&gt;
'''Firetalk Format - 1.) Hashing vs. Encryption for Passwords, 2.) AppInventory/AppDiscovery in the SDLC, and 3.) Abusing SSI'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; [http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=232894</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=232894"/>
				<updated>2017-09-05T17:34:34Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
'''Link to presentation from August 31st Meeting on &amp;quot;Recon - Seek and Destroy&amp;quot; is located here -&amp;gt; '''[http://bit.ly/2wVJkTd Recon - Seek and Destroy]&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from October meeting is located here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing SQLi Presentation]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;Everyone is always welcome to join us at our chapter meetings.&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Link to OWASP Vulnerable Web Applications Directory Project can be found here -&amp;gt; [[OWASP Vulnerable Web Applications Directory Project]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=232893</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=232893"/>
				<updated>2017-09-05T17:26:02Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
August 31st, 2017 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
''SIGN UP HERE ---&amp;gt;'' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-36367635577 - ''Join us for '''&amp;quot;Recon - Seek and Destroy&amp;quot;''''' &lt;br /&gt;
&lt;br /&gt;
''This first phase of a web application penetration test is focused on collecting as much information as possible about a target application. We will explore some of the most common ways to explore web applications today.''&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231936</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231936"/>
				<updated>2017-07-31T17:13:08Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;amp;lt;nowiki&amp;amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;amp;lt;/nowiki&amp;amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
August 31st, 2017 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
''SIGN UP HERE ---&amp;gt;'' https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-36367635577 - ''Join us for '''&amp;quot;Recon - Seek and Destroy&amp;quot;''''' &lt;br /&gt;
&lt;br /&gt;
''This first phase of a web application penetration test is focused on collecting as much information as possible about a target application. We will explore some of the most common ways to explore web applications today.''&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231935</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231935"/>
				<updated>2017-07-31T15:41:06Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;amp;lt;nowiki&amp;amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;amp;lt;/nowiki&amp;amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
August 31st, 2017 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
''Join us for &amp;quot;Recon - Seek and Destroy&amp;quot;'' &lt;br /&gt;
&lt;br /&gt;
''This first phase of a web application penetration test is focused on collecting as much information as possible about a target application. We will explore some of the most common ways to explore web applications today.''&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231774</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231774"/>
				<updated>2017-07-19T21:36:06Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;amp;lt;nowiki&amp;amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;amp;lt;/nowiki&amp;amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
August 2017 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-36367635577 - ''Join us for &amp;quot;Recon - Seek and Destroy&amp;quot;'' &lt;br /&gt;
&lt;br /&gt;
''This first phase of a web application penetration test is focused on collecting as much information as possible about a target application. We will explore some of the most common ways to explore web applications today.''&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231773</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=231773"/>
				<updated>2017-07-19T21:33:42Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;amp;lt;nowiki&amp;amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;amp;lt;/nowiki&amp;amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci], [mailto:Ralph.Collum@owasp.org Ralph Collum], [mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
October 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-27918792861 - Join us for SQLi from a dev perspective =)&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=224282</id>
		<title>Frank Catucci 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=224282"/>
				<updated>2016-12-20T23:41:48Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Frank:'''&lt;br /&gt;
&lt;br /&gt;
Frank Catucci is currently the Director of Web Application Security, Product Manager and a Subject Matter Expert for Qualys. He has over 15 years experience in the Information Technology and Security field that spans enterprise, financial services, university/higher education, government, healthcare, legal, start-up businesses, public and private industries. Aside from his daily Web Application Security duties, Frank also conducts security research, penetration testing, and often speaks at information security conferences and events.&lt;br /&gt;
&lt;br /&gt;
Frank is also the OWASP chapter leader for the Columbia, SC OWASP chapter. Frank is a volunteer and industry mentor for CybersecurityFactory, Highland Partners and MIT.edu mentorship projects and initiatives. Frank is part of the OWASP bug bounty initiative and contributes to other wiki and cheatsheet content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I love OWASP and everything that it offers to the world of appsec and infosec globally. There are some brilliant minds, determined, diligent and genuinely caring folks at OWASP. &lt;br /&gt;
&lt;br /&gt;
I want to be able to give back to an organization that is maturing, seemingly reaching a turning point in its growth and evolution, and has been affected by recent loss. I care deeply and want to be able to help in the most professional and diplomatic way possible. I think first and foremost, focusing on training and outreach is pivotal to accomplishing this goal and this is what I want to concentrate on if I am elected.&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=223615</id>
		<title>Frank Catucci 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=223615"/>
				<updated>2016-11-23T00:38:33Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Frank:'''&lt;br /&gt;
&lt;br /&gt;
Frank Catucci is currently the Director of Web Application Security, Product Manager and a Subject Matter Expert for Qualys. He has over 15 years experience in the Information Technology and Security field that spans enterprise, financial services, university/higher education, government, healthcare, legal, start-up businesses, public and private industries. Aside from his daily Web Application Security duties, Frank also conducts security research, penetration testing, and often speaks at information security conferences and events.&lt;br /&gt;
&lt;br /&gt;
Frank is also the OWASP chapter leader for the Columbia, SC OWASP chapter. Frank is a volunteer and industry mentor for CybersecurityFactory, Highland Partners and MIT.edu mentorship projects and initiatives. Frank is part of the OWASP bug bounty initiative and contributes to other wiki and cheatsheet content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I love OWASP and everything that it offers to the world of appsec and infosec globally. There are some brilliant minds, determined, diligent and genuinely caring folks at OWASP. &lt;br /&gt;
&lt;br /&gt;
I want to be able to give back to an organization that is maturing, seemingly reaching a turning point in its growth and evolution, and has been affected by recent loss. I care deeply and want to be able to help in the most professional and diplomatic way possible. I think first and foremost, focusing on training and outreach is pivotal to accomplishing this goal and this is what I want to concentrate on if I am elected.&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222207</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222207"/>
				<updated>2016-10-07T14:45:23Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;lt;nowiki&amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;lt;/nowiki&amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Ralph.Collum@owasp.org Ralph Collum],[mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
October 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-27918792861 - Join us for SQLi from a dev perspective =)&lt;br /&gt;
&lt;br /&gt;
'''PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222206</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222206"/>
				<updated>2016-10-07T14:44:49Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;&amp;lt;nowiki&amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;&amp;lt;/nowiki&amp;gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Ralph.Collum@owasp.org Ralph Collum],[mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
October 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-27918792861 - Join us for SQLi from a dev perspective =)&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222205</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=222205"/>
				<updated>2016-10-07T14:43:14Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Ralph.Collum@owasp.org Ralph Collum],[mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
October 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-27918792861 - Join us for SQLi from a dev perspective =)&lt;br /&gt;
&lt;br /&gt;
PDF from SQLi meeting from 10/6/2016 meeting here -&amp;gt; [https://drive.google.com/file/d/0B4C2y2IyDLI8YmRCUnluSTE3ZlE/view?usp=sharing]&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=221611</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=221611"/>
				<updated>2016-09-21T12:26:28Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Ralph.Collum@owasp.org Ralph Collum],[mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
October 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-27918792861 - Join us for SQLi from a dev perspective =)&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=221260</id>
		<title>Frank Catucci 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=221260"/>
				<updated>2016-09-12T19:19:33Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Frank:'''&lt;br /&gt;
&lt;br /&gt;
Frank Catucci is currently the Director of Web Application Security, Product Manager and a Subject Matter Expert for Qualys. He has over 15 years experience in the Information Technology and Security field that spans enterprise, financial services, university/higher education, government, healthcare, legal, start-up businesses, public and private industries. Aside from his daily Web Application Security duties, Frank also conducts security research, penetration testing, and often speaks at information security conferences and events.&lt;br /&gt;
&lt;br /&gt;
Frank is also the OWASP chapter leader for the relative new formed Columbia, SC OWASP chapter. Frank is a volunteer and industry mentor for CybersecurityFactory, Highland Partners and MIT.edu mentorship projects and initiatives. Frank is part of the OWASP bug bounty initiative and contributes to other wiki and cheatsheet content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I love OWASP and everything that it offers to the world of appsec and infosec globally. There are some brilliant minds, determined, diligent and genuinely caring folks at OWASP. &lt;br /&gt;
&lt;br /&gt;
I want to be able to give back to an organization that is maturing, seemingly reaching a turning point in its growth and evolution, and has been affected by recent loss. I care deeply and want to be able to help in the most professional and diplomatic way possible. I think first and foremost, focusing on training and outreach is pivotal to accomplishing this goal and this is what I want to concentrate on if I am elected.&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=220703</id>
		<title>Frank Catucci 2016 Bio &amp; Why Me?</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Frank_Catucci_2016_Bio_%26_Why_Me%3F&amp;diff=220703"/>
				<updated>2016-08-24T20:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''About Frank:'''&lt;br /&gt;
&lt;br /&gt;
Frank Catucci is currently the Director of Web Application Security, Product Manager and a Subject Matter Expert for Qualys. He has over 15 years experience in the Information Technology and Security field that spans enterprise, financial services, university/higher education, government, healthcare, legal, start-up businesses, public and private industries. Aside from his daily Web Application Security duties, Frank also conducts security research, penetration testing, and often speaks at information security conferences and events.&lt;br /&gt;
&lt;br /&gt;
Frank is also the OWASP chapter leader for the relative new formed Columbia, SC OWASP chapter. Frank is a volunteer and industry mentor for CybersecurityFactory, Highland Partners and MIT.edu mentorship projects and initiatives. Frank is part of the OWASP bug bounty initiative and contributes to other wiki and cheatsheet content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Why I would like to be elected to the Global OWASP Foundation Board of Directors'''&lt;br /&gt;
&lt;br /&gt;
I love OWASP and everything that it offers to the world of appsec and infosec globally. There are some brilliant minds, determined, diligent and genuinely caring folks at OWASP. There is plenty of discord and disagreement, but for the most part it is constructive. &lt;br /&gt;
&lt;br /&gt;
I want to be able to give back to an organization that is maturing, seemingly reaching a turning point, and has been affected by recent loss. I care and want to be able to help in the most professional and diplomatic way possible. I think focusing on training and outreach is pivotal to accomplishing this goal and this is what I want to concentrate on.&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=220378</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=220378"/>
				<updated>2016-08-15T13:52:07Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Ralph.Collum@owasp.org Ralph Collum],[mailto:wscalf@gmail.com William Scalf].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
January 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-19920840771&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208996</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208996"/>
				<updated>2016-02-16T14:07:06Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Contributions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
* Coordinating and Assisting in Bug Bounty Program for OWASP (TBD)&lt;br /&gt;
&lt;br /&gt;
===Sponsorship Barter deals Bug Bounty Management Services ===&lt;br /&gt;
&lt;br /&gt;
Kelly SantaLucia, Josh Sokol and Claudia are leading this effort, Johanna as adviser (Bug Bounty for projects), Frank Catucci as adviser (hiring, if barter deal is reached)&lt;br /&gt;
 &lt;br /&gt;
Goal: to find a Bug Bounty Management Services willing to sponsorship OWASP in barter deal contract&lt;br /&gt;
&lt;br /&gt;
Details are still being discussed&lt;br /&gt;
&lt;br /&gt;
Status:&lt;br /&gt;
 * BugCrowd proposal==&amp;gt; In progress, Proposal received&lt;br /&gt;
 * HackerOne ==&amp;gt; made contact , no proposal received yet&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Bug validation - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Bug/Researcher Disclosure and Coordination - [[user:Frank.catucci|Frank Catucci]] , [[user:Gabrielgumbs|Gabriel Gumbs]] ,&lt;br /&gt;
* Pen testing - [[user:cchamberland|CJ Chamberland]] and [[user:Frank.catucci|Frank Catucci]], [[user:Makash|Akash Mahajan]] and [https://www.owasp.org/index.php/Bangalore#tab=Chapter_Leaders| Riyaz Walikar]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman - [[user:achim|Achim]]&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208719</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208719"/>
				<updated>2016-02-13T00:37:31Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Contributions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
* Coordinating and Assisting in Bug Bounty Program for OWASP (TBD)&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Bug validation - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Bug/Researcher Disclosure and Coordination - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Pen testing - [[user:cchamberland|CJ Chamberland]] and [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman - [[user:achim|Achim]]&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208718</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208718"/>
				<updated>2016-02-13T00:36:25Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Volunteers/Companies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Bug validation - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Bug/Researcher Disclosure and Coordination - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Pen testing - [[user:cchamberland|CJ Chamberland]] and [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman - [[user:achim|Achim]]&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208717</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208717"/>
				<updated>2016-02-13T00:35:50Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Volunteers/Companies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Bug validation - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Bug/Researcher Disclosure and Coordination - [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Pen testing - [[user:cchamberland|CJ Chamberland]] and [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman: &amp;amp;nbsp; &amp;amp;nbsp; - [[user:achim|Achim]],&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208716</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208716"/>
				<updated>2016-02-13T00:35:12Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Volunteers/Companies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Bug validation [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Bug/Researcher Disclosure and Coordination [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* Pen testing [[user:cchamberland|CJ Chamberland]] and [[user:Frank.catucci|Frank Catucci]]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman: &amp;amp;nbsp; &amp;amp;nbsp; [[user:achim|Achim]],&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208715</id>
		<title>Help Secure Owasp assests</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help_Secure_Owasp_assests&amp;diff=208715"/>
				<updated>2016-02-13T00:29:18Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Goals */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Draft=&lt;br /&gt;
This is a draft proposal, Noithing should be concluded until this is discussed by OWASP management and the Board&lt;br /&gt;
&lt;br /&gt;
==Vendor Neutrality==&lt;br /&gt;
About the OWASP Foundation: The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. You'll find everything about OWASP linked from our wiki and current information on our OWASP Blog. &lt;br /&gt;
&lt;br /&gt;
'''OWASP does not endorse or recommend any product or service This allowing our community to remain vendor neutral with the collective wisdom of the best minds in software security worldwide.'''&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Project_Sponsorship_Operational_Guidelines&lt;br /&gt;
&lt;br /&gt;
==Goals==&lt;br /&gt;
Find volunteers/companies willing to help with a proactive security plan for protecting OWASP applications such as&lt;br /&gt;
* Wiki&lt;br /&gt;
* Mailman&lt;br /&gt;
* Any other OWASP publicly accessible assets&lt;br /&gt;
&lt;br /&gt;
==Contributions==&lt;br /&gt;
This can be in the form of:&lt;br /&gt;
&lt;br /&gt;
* Security assessment of OWASP web applications&lt;br /&gt;
* Pen testing&lt;br /&gt;
* Remediation and patching&lt;br /&gt;
&lt;br /&gt;
==Volunteers/Companies==&lt;br /&gt;
Please add your name here or contact Johanna Curiel or Claudia Aviles- Casanovas to add your name in case you have no access to the wiki&lt;br /&gt;
&lt;br /&gt;
Set please the following info:&lt;br /&gt;
*Company/name volunteer&lt;br /&gt;
* Kind of contribution:&lt;br /&gt;
* Pen testing [[user:cchamberland|CJ Chamberland]]&lt;br /&gt;
* UAT&lt;br /&gt;
* Patching wiki&lt;br /&gt;
* Patching mailman: &amp;amp;nbsp; &amp;amp;nbsp; [[user:achim|Achim]],&lt;br /&gt;
&lt;br /&gt;
==Proposals==&lt;br /&gt;
This will be discussed during the Board meeting on February 17th 2016&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Columbia&amp;diff=205618</id>
		<title>Columbia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Columbia&amp;diff=205618"/>
				<updated>2015-12-29T15:47:15Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Columbia, SC, USA|extra=The chapter leaders are [mailto:Frank.Catucci@owasp.org Frank Catucci],[mailto:Timothy.Deblock@owasp.org Timothy De Block],[mailto:Ralph.Collum@owasp.org Ralph Collum].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-columbia|emailarchives=http://lists.owasp.org/pipermail/owasp-columbia}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
January 2016 Meeting is scheduled!&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-columbia-meeting-tickets-19920840771&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;br /&gt;
[[Category:South Carolina]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200760</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200760"/>
				<updated>2015-09-17T18:10:29Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Session Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* [[Testing_for_Session_Management_Schema_(OTG-SESS-001)#Session_ID_Predictability_and_Randomness | Test session cookies for randomness]]&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* [[Test_business_logic_data_validation_(OTG-BUSLOGIC-001) | Test business logic data validation]] &lt;br /&gt;
* [[Test_Ability_to_forge_requests_(OTG-BUSLOGIC-002) | Test ability to forge requests]]&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-015) | Test Upload of Unexpected File Types]]&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-016) | Test upload of malicious files]]&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200073</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200073"/>
				<updated>2015-09-04T16:18:46Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* [[Test_business_logic_data_validation_(OTG-BUSLOGIC-001) | Test business logic data validation]] &lt;br /&gt;
* [[Test_Ability_to_forge_requests_(OTG-BUSLOGIC-002) | Test ability to forge requests]]&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-015) | Test Upload of Unexpected File Types]]&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-016) | Test upload of malicious files]]&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200072</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200072"/>
				<updated>2015-09-04T16:17:27Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* [[Test_business_logic_data_validation_(OTG-BUSLOGIC-001) | Test business logic data validation]] &lt;br /&gt;
* [[Test_Ability_to_forge_requests_(OTG-BUSLOGIC-002) | Test ability to forge requests]]&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-015) | Test Upload of Unexpected File Types]]&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200071</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200071"/>
				<updated>2015-09-04T16:16:18Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
*[[Test_business_logic_data_validation_(OTG-BUSLOGIC-001) | Test business logic data validation]] &lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-015) | Test Upload of Unexpected File Types]]&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200070</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200070"/>
				<updated>2015-09-04T16:14:21Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-015) | Test Upload of Unexpected File Types]]&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200069</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200069"/>
				<updated>2015-09-04T16:13:18Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* [[Testing_for_the_Circumvention_of_Work_Flows_(OTG-BUSLOGIC-009) | Test for the Circumvention of Work Flows]]&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200068</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200068"/>
				<updated>2015-09-04T16:12:27Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* [[Test_number_of_times_a_function_can_be_used_limits_(OTG-BUSLOGIC-007) | Test Number of Times a Function Can be Used Limits]]&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200067</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200067"/>
				<updated>2015-09-04T16:11:30Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* [[Test_for_Process_Timing_(OTG-BUSLOGIC-007) | Test for Process Timing]]&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200066</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200066"/>
				<updated>2015-09-04T16:10:38Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* [[Test_integrity_checks_(OTG-BUSLOGIC-003) | Test for integrity of data]]&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200065</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200065"/>
				<updated>2015-09-04T16:09:03Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test Defenses Against Application Mis-use]]&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200064</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200064"/>
				<updated>2015-09-04T16:08:02Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Business Logic */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* [[Test_defenses_against_application_mis-use_(OTG-BUSLOGIC-011) | Test for feature misuse]]&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200038</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200038"/>
				<updated>2015-09-03T19:53:31Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Secure Transmission */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* [[Test_HTTP_Strict_Transport_Security_(OTG-CONFIG-009) | Check if HTTP Strict Transport Security (HSTS) in use]]&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200025</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200025"/>
				<updated>2015-09-03T18:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Secure Transmission */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001) | Check SSL Version, Algorithms, Key length]]&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200024</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200024"/>
				<updated>2015-09-03T18:13:51Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Configuration Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* [[Test_HTTP_Methods_(OTG-CONFIG-006) | Check HTTP methods supported and Cross Site Tracing (XST)]]&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200023</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200023"/>
				<updated>2015-09-03T18:12:15Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Configuration Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* [[4.3.3_Test_File_Extensions_Handling_for_Sensitive_Information_(OTG-CONFIG-003) | Test file extensions handling]]&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200022</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200022"/>
				<updated>2015-09-03T18:10:57Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Configuration Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* [[4.3.4_Review_Old,_Backup_and_Unreferenced_Files_for_Sensitive_Information_(OTG-CONFIG-004) | Check for old, backup and unreferenced files]]&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200021</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200021"/>
				<updated>2015-09-03T18:07:55Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Configuration Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for [[List_of_useful_HTTP_headers | security HTTP headers]] (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200020</id>
		<title>Web Application Security Testing Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Web_Application_Security_Testing_Cheat_Sheet&amp;diff=200020"/>
				<updated>2015-09-03T18:06:03Z</updated>
		
		<summary type="html">&lt;p&gt;Frank.catucci: /* Configuration Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This cheat sheet provides a checklist of tasks to be performed when performing a blackbox security test of a web application.&lt;br /&gt;
&lt;br /&gt;
= Purpose =&lt;br /&gt;
&lt;br /&gt;
This checklist is intended to be used as an aide memoire for experienced pentesters and should be used in conjunction with the [[:Category:OWASP Testing Project|OWASP Testing Guide]]. It will be updated as the [[OWASP_Application_Testing_guide_v4|Testing Guide v4]] is progressed.&lt;br /&gt;
&lt;br /&gt;
The intention is that this guide will be available as an XML document, with scripts that convert it into formats such as pdf, Media Wiki markup, HTML etc. &lt;br /&gt;
&lt;br /&gt;
This will allow it to be consumed within security tools as well as being available in a format suitable for printing.&lt;br /&gt;
&lt;br /&gt;
All feedback or offers of help will be appreciated - and if you have specific chances you think should be made, just get stuck in.&lt;br /&gt;
&lt;br /&gt;
= The Checklist =&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
* Manually explore the site&lt;br /&gt;
* [[Testing:_Spidering_and_googling | Spider/crawl]] for missed or hidden content&lt;br /&gt;
* [[Review_Webserver_Metafiles_for_Information_Leakage_(OTG-INFO-003)|Check the Webserver Metafiles]] for information leakage files that expose content, such as robots.txt, sitemap.xml, .DS_Store&lt;br /&gt;
* [[Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)|Check the caches of major search engines for publicly accessible sites]]&lt;br /&gt;
* Check for differences in content based on User Agent (eg, Mobile sites, access as a Search engine Crawler)&lt;br /&gt;
* [[Review_webpage_comments_and_metadata_for_information_leakage_(OTG-INFO-005) | Check The Webpage Comments and Metadata for Information Leakage]]&lt;br /&gt;
* [[Fingerprint_Web_Application_Framework_(OTG-INFO-008) | Check The Web Application Framework]]&lt;br /&gt;
* [[Fingerprint_Web_Server_(OTG-INFO-002)|Perform Web Application Fingerprinting]]&lt;br /&gt;
* Identify technologies used&lt;br /&gt;
* [[Test_Role_Definitions_(OTG-IDENT-001)|Identify user roles]]&lt;br /&gt;
* [[Identify_application_entry_points_(OTG-INFO-006) | Identify application entry points]]&lt;br /&gt;
* Identify client-side code&lt;br /&gt;
* Identify multiple versions/channels (e.g. web, mobile web, mobile app)&lt;br /&gt;
* [[Web_Services | Identify web services]]&lt;br /&gt;
* Identify co-hosted and related applications&lt;br /&gt;
* Identify all hostnames and ports&lt;br /&gt;
* Identify third-party hosted content&lt;br /&gt;
&lt;br /&gt;
== Configuration Management ==&lt;br /&gt;
* Check for commonly used application and administrative URLs&lt;br /&gt;
* Check for old, backup and unreferenced files&lt;br /&gt;
* Check HTTP methods supported and Cross Site Tracing (XST)&lt;br /&gt;
* Test file extensions handling&lt;br /&gt;
* [[Test_RIA_cross_domain_policy_(OTG-CONFIG-008) | Test RIA cross domain policy]]&lt;br /&gt;
* Test for security HTTP headers (e.g. CSP, X-Frame-Options, HSTS)&lt;br /&gt;
* Test for policies (e.g. Flash, Silverlight, robots)&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* Check for sensitive data in client-side code (e.g. API keys, credentials)&lt;br /&gt;
&lt;br /&gt;
== Secure Transmission ==&lt;br /&gt;
* Check SSL Version, Algorithms, Key length&lt;br /&gt;
* Check for Digital Certificate Validity (Duration, Signature and CN)&lt;br /&gt;
* Check credentials only delivered over HTTPS&lt;br /&gt;
* Check that the login form is delivered over HTTPS&lt;br /&gt;
* Check session tokens only delivered over HTTPS&lt;br /&gt;
* Check if HTTP Strict Transport Security (HSTS) in use&lt;br /&gt;
&lt;br /&gt;
== Authentication ==&lt;br /&gt;
* [[Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002) | Test for user enumeration]]&lt;br /&gt;
* [[Testing_for_Bypassing_Authentication_Schema_(OTG-AUTHN-004) | Test for authentication bypass]]&lt;br /&gt;
* [[Testing_for_Brute_Force_(OWASP-AT-004) | Test for brute force protection]]&lt;br /&gt;
* [[Testing_for_Credentials_Transported_over_an_Encrypted_Channel_(OTG-AUTHN-001)|Test for Credentials Transported over an Encrypted Channel]]&lt;br /&gt;
* [[Testing_for_Weak_password_policy_(OTG-AUTHN-007)|Test password quality rules&lt;br /&gt;
* Test remember me functionality]]&lt;br /&gt;
* Test password reset and/or recovery&lt;br /&gt;
* Test password change process&lt;br /&gt;
* Test CAPTCHA&lt;br /&gt;
* Test multi factor authentication&lt;br /&gt;
* Test for logout functionality presence&lt;br /&gt;
* Test for cache management on HTTP (eg Pragma, Expires, Max-age)&lt;br /&gt;
* Test for default logins&lt;br /&gt;
* Test for user-accessible authentication history&lt;br /&gt;
* Test for out-of channel notification of account lockouts and successful password changes&lt;br /&gt;
* Test for consistent authentication across applications with shared authentication schema / SSO and alternative channels&lt;br /&gt;
* Test for Weak security question/answer&lt;br /&gt;
&lt;br /&gt;
== Session Management ==&lt;br /&gt;
* Establish how session management is handled in the application (eg, tokens in cookies, token in URL)&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session tokens for cookie flags (httpOnly and secure)]]&lt;br /&gt;
* [[Testing_for_cookies_attributes_(OTG-SESS-002)|Check session cookie scope (path and domain)]]&lt;br /&gt;
* Check session cookie duration (expires and max-age)&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after a maximum lifetime]]&lt;br /&gt;
* [[Test_Session_Timeout_(OTG-SESS-007)|Check session termination after relative timeout]]&lt;br /&gt;
* [[Testing_for_logout_functionality_(OTG-SESS-006)|Check session termination after logout]]&lt;br /&gt;
* Test to see if users can have multiple simultaneous sessions&lt;br /&gt;
* Test session cookies for randomness&lt;br /&gt;
* Confirm that new session tokens are issued on login, role change and logout&lt;br /&gt;
* Test for consistent session management across applications with shared session management&lt;br /&gt;
* Test for session puzzling&lt;br /&gt;
* Test for CSRF and clickjacking&lt;br /&gt;
&lt;br /&gt;
== Authorization ==&lt;br /&gt;
* [[Testing_Directory_traversal/file_include_(OTG-AUTHZ-001)|Test for path traversal]]&lt;br /&gt;
* [[Testing_for_Privilege_escalation_(OTG-AUTHZ-003)|Test for vertical Access control problems (a.k.a. Privilege Escalation)]]&lt;br /&gt;
* Test for horizontal Access control problems (between two users at the same privilege level)&lt;br /&gt;
* [[Testing_for_Bypassing_Authorization_Schema_(OTG-AUTHZ-002)|Test for missing authorisation]]&lt;br /&gt;
* [[Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)|Test for Insecure Direct Object References]]&lt;br /&gt;
&lt;br /&gt;
== Data Validation ==&lt;br /&gt;
* [[Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)|Test for Reflected Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_Stored_Cross_site_scripting_(OTG-INPVAL-002)|Test for Stored Cross Site Scripting]]&lt;br /&gt;
* [[Testing_for_DOM-based_Cross_site_scripting_(OTG-CLIENT-001)|Test for DOM based Cross Site Scripting]]&lt;br /&gt;
* Test for Cross Site Flashing&lt;br /&gt;
* Test for HTML Injection&lt;br /&gt;
* [[Testing_for_SQL_Injection_(OTG-INPVAL-005)|Test for SQL Injection]]&lt;br /&gt;
* Test for LDAP Injection&lt;br /&gt;
* [[Testing_for_ORM_Injection_(OTG-INPVAL-007)|Test for ORM Injection]]&lt;br /&gt;
* [[Testing_for_XML_Injection_(OTG-INPVAL-008)|Test for XML Injection]]&lt;br /&gt;
* Test for XXE Injection&lt;br /&gt;
* [[Testing_for_SSI_Injection_(OTG-INPVAL-009)|Test for SSI Injection]]&lt;br /&gt;
* [[Testing_for_XPath_Injection_(OTG-INPVAL-010)|Test for XPath Injection]]&lt;br /&gt;
* Test for XQuery Injection&lt;br /&gt;
* [[Testing_for_IMAP/SMTP_Injection_(OTG-INPVAL-011)|Test for IMAP/SMTP Injection]]&lt;br /&gt;
* [[Testing_for_Code_Injection_(OTG-INPVAL-012)|Test for Code Injection]]&lt;br /&gt;
* Test for Expression Language Injection&lt;br /&gt;
* [[Testing_for_Command_Injection_(OTG-INPVAL-013)|Test for Command Injection]]&lt;br /&gt;
* Test for Overflow ([[Testing_for_Stack_Overflow|Stack]], [[Testing_for_Heap_Overflow|Heap]] and Integer)&lt;br /&gt;
* [[Testing_for_Format_String|Test for Format String]]&lt;br /&gt;
* Test for incubated vulnerabilities&lt;br /&gt;
* [[Testing_for_HTTP_Splitting/Smuggling_(OTG-INPVAL-016)|Test for HTTP Splitting/Smuggling]]&lt;br /&gt;
* Test for HTTP Verb Tampering&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards|Test for Open Redirection]]&lt;br /&gt;
* [[Testing_for_Local_File_Inclusion|Test for Local File Inclusion]]&lt;br /&gt;
* [[Testing_for_Remote_File_Inclusion|Test for Remote File Inclusion]]&lt;br /&gt;
* Compare client-side and server-side validation rules&lt;br /&gt;
* Test for NoSQL injection&lt;br /&gt;
* Test for HTTP parameter pollution&lt;br /&gt;
* Test for auto-binding&lt;br /&gt;
* Test for Mass Assignment&lt;br /&gt;
* Test for NULL/Invalid Session Cookie&lt;br /&gt;
&lt;br /&gt;
== Denial of Service ==&lt;br /&gt;
* Test for anti-automation&lt;br /&gt;
* [[Testing_for_Weak_lock_out_mechanism_(OTG-AUTHN-003)|Test for account lockout]]&lt;br /&gt;
* Test for HTTP protocol DoS&lt;br /&gt;
* Test for SQL wildcard DoS&lt;br /&gt;
&lt;br /&gt;
== Business Logic ==&lt;br /&gt;
* Test for feature misuse&lt;br /&gt;
* Test for lack of non-repudiation&lt;br /&gt;
* Test for trust relationships&lt;br /&gt;
* Test for integrity of data&lt;br /&gt;
* Test segregation of duties&lt;br /&gt;
* Test for Process Timing&lt;br /&gt;
* Test Number of Times a Function Can be Used Limits&lt;br /&gt;
* Test for the Circumvention of Work Flows&lt;br /&gt;
* Test Defenses Against Application Mis-use&lt;br /&gt;
* Test Upload of Unexpected File Types&lt;br /&gt;
&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* [[Testing_for_Sensitive_information_sent_via_unencrypted_channels_(OTG-CRYPST-003)|Check if data which should be encrypted is not]]&lt;br /&gt;
* Check for wrong algorithms usage depending on context&lt;br /&gt;
* [[Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)|Check for weak algorithms usage]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet#Use_a_cryptographically_strong_credential-specific_salt | Check for proper use of salting]]&lt;br /&gt;
* [[Insecure_Randomness | Check for randomness functions]]&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - File Uploads ==&lt;br /&gt;
* [[Test_Upload_of_Unexpected_File_Types_(OTG-BUSLOGIC-008)|Test that acceptable file types are whitelisted and non-whitelisted types are rejected]]&lt;br /&gt;
* Test that file size limits, upload frequency and total file counts are defined and are enforced&lt;br /&gt;
* Test that file contents match the defined file type&lt;br /&gt;
* [[Test_Upload_of_Malicious_Files_(OTG-BUSLOGIC-009)|Test that all file uploads have Anti-Virus scanning in-place.]]&lt;br /&gt;
* Test that unsafe filenames are sanitised&lt;br /&gt;
* Test that uploaded files are not directly accessible within the web root&lt;br /&gt;
* Test that uploaded files are not served on the same hostname/port&lt;br /&gt;
* Test that files and other media are integrated with the authentication and authorisation schemas&lt;br /&gt;
&lt;br /&gt;
== Risky Functionality - Card Payment ==&lt;br /&gt;
* Test for known vulnerabilities and configuration issues on Web Server and Web Application&lt;br /&gt;
* Test for default or guessable password&lt;br /&gt;
* Test for non-production data in live environment, and vice-versa&lt;br /&gt;
* [[Injection_Flaws | Test for Injection vulnerabilities ]]&lt;br /&gt;
* [[Testing_for_Buffer_Overflow_(OTG-INPVAL-014) | Test for Buffer Overflows]]&lt;br /&gt;
* [[Top_10_2010-A7-Insecure_Cryptographic_Storage | Test for Insecure Cryptographic Storage]]&lt;br /&gt;
* [[Top_10_2010-A9-Insufficient_Transport_Layer_Protection | Test for Insufficient Transport Layer Protection]]&lt;br /&gt;
* [[Web_Application_Security_Testing_Cheat_Sheet#Error_Handling|Test for Improper Error Handling]]&lt;br /&gt;
* Test for all vulnerabilities with a CVSS v2 score &amp;gt; 4.0&lt;br /&gt;
* Test for Authentication and Authorization issues&lt;br /&gt;
* [[Testing_for_CSRF_(OTG-SESS-005)|Test for CSRF]]&lt;br /&gt;
&lt;br /&gt;
== Web Service Testing ==&lt;br /&gt;
* [[Web_Service_Security_Testing_Cheat_Sheet | Test for Web Service Issues]]&lt;br /&gt;
* [[REST_Assessment_Cheat_Sheet | Test REST]]&lt;br /&gt;
&lt;br /&gt;
== HTML 5==&lt;br /&gt;
* [[Test_Web_Messaging_(OTG-CLIENT-011)|Test Web Messaging]]&lt;br /&gt;
* [[Test_Local_Storage_(OTG-CLIENT-012)|Test for Web Storage SQL injection]]&lt;br /&gt;
* [[Test_Cross_Origin_Resource_Sharing_(OTG-CLIENT-007)|Check CORS implementation]]&lt;br /&gt;
* [[HTML5_Security_Cheat_Sheet#Offline_Applications | Check Offline Web Application]]&lt;br /&gt;
&lt;br /&gt;
== Error Handling==&lt;br /&gt;
* [[Testing_for_Error_Code_(OTG-ERR-001)|Check for Error Codes]]&lt;br /&gt;
* [[Testing_for_Stack_Traces_(OTG-ERR-002)|Check for Stack Traces]]&lt;br /&gt;
&lt;br /&gt;
== Other Formats ==&lt;br /&gt;
* DradisPro template format [https://github.com/raesene/OWASP_Web_App_Testing_Cheatsheet_Converter/blob/master/OWASP_Web_Application_Testing_Cheat_Sheet.xml on github]&lt;br /&gt;
* Asana template on [http://templana.com/templates/owasp-website-security-checklist/ Templana] (thanks to Bastien Siebman)&lt;br /&gt;
&lt;br /&gt;
== Authors and contributors ==&lt;br /&gt;
&lt;br /&gt;
[[User:Simon Bennetts|Simon Bennetts]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Raesene|Rory McCune]] &amp;lt;br/&amp;gt;&lt;br /&gt;
Colin Watson&amp;lt;br/&amp;gt;&lt;br /&gt;
Simone Onofri&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Amro_Ahmed|Amro AlOlaqi]] &lt;br /&gt;
&lt;br /&gt;
All above are authors of the [[OWASP_Testing_Guide_v3_Table_of_Contents | Testing Guide v3]] &lt;br /&gt;
&lt;br /&gt;
[[User:Ryan_Dewhurst|Ryan Dewhurst]]&amp;lt;br/&amp;gt;&lt;br /&gt;
[[User:Frank.catucci | Frank Catucci]]&lt;br /&gt;
&lt;br /&gt;
== Related articles ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
&lt;br /&gt;
Mozilla [https://wiki.mozilla.org/WebAppSec/Web_Security_Verification Web Security Verification]&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]] [[Category:OWASP_Breakers]]&lt;/div&gt;</summary>
		<author><name>Frank.catucci</name></author>	</entry>

	</feed>