This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Reporting"
From OWASP
| Line 1: | Line 1: | ||
{{Template:OWASP Testing Guide v2}} | {{Template:OWASP Testing Guide v2}} | ||
| + | |||
| + | {| border=1 | ||
| + | || '''Category''' || '''Ref Number''' || '''Name ''' || '''Finding ''' ||'''Affected Item'''|| '''Comment/Solution ''' || '''Risk Value ''' | ||
| + | |- | ||
| + | || Information Gathering || || Application Discovery || || || || | ||
| + | |- | ||
| + | || || || Spidering and googling || || || || | ||
| + | |- | ||
| + | || || || Analisys of error code || || || || | ||
| + | |- | ||
| + | || || || SSL/TLS Testing || || || || | ||
| + | |- | ||
| + | || || || DB Listener Testing || || || || | ||
| + | |- | ||
| + | || || || File extensions handling || || || || | ||
| + | |- | ||
| + | || || || Old, backup and unreferenced files || || || || | ||
| + | |- | ||
| + | ||Business logic testing || || || || || || | ||
| + | |- | ||
| + | || Authentication Testing || || Default or guessable account || || || || | ||
| + | |- | ||
| + | || || || Brute Force || || || || | ||
| + | |- | ||
| + | || || || Bypassing authentication schema || || || || | ||
| + | |- | ||
| + | || || || Directory traversal/file include || || || || | ||
| + | |- | ||
| + | || || || Vulnerable remember password and pwd reset || || || || | ||
| + | |- | ||
| + | || || || Logout and Browser Cache Management Testing || || || || | ||
| + | |- | ||
| + | || Session Management Testing || || Session Management Schema || || || || | ||
| + | |- | ||
| + | || || || Session Token Manipulation || || || || | ||
| + | |- | ||
| + | || || || Exposed Session Variables || || || || | ||
| + | |- | ||
| + | || || || Session Riding || || || || | ||
| + | |- | ||
| + | || || || HTTP Exploit || || || || | ||
| + | |- | ||
| + | || Data Validation Testing || || Cross site scripting || || || || | ||
| + | |- | ||
| + | || || || HTTP Methods and XST || || || || | ||
| + | |- | ||
| + | || || || SQL Injection || || || || | ||
| + | |- | ||
| + | || || || Stored procedure injection || || || || | ||
| + | |- | ||
| + | || || || ORM Injection || || || || | ||
| + | |- | ||
| + | || || || LDAP Injection || || || || | ||
| + | |- | ||
| + | || || || XML Injection || || || || | ||
| + | |- | ||
| + | || || || SSI Injection || || || || | ||
| + | |- | ||
| + | || || || XPath Injection || || || || | ||
| + | |- | ||
| + | || || || IMAP/SMTP Injection || || || || | ||
| + | |- | ||
| + | || || || Code Injection || || || || | ||
| + | |- | ||
| + | || || || OS Commanding || || || || | ||
| + | |- | ||
| + | || || || Buffer overflow || || || || | ||
| + | |- | ||
| + | || || || Incubated vulnerability || || || || | ||
| + | |- | ||
| + | || Denial of Service Testing || || Locking Customer Accounts || || || || | ||
| + | |- | ||
| + | || || || User Specified Object Allocation || || || || | ||
| + | |- | ||
| + | || || || User Input as a Loop Counter || || || || | ||
| + | |- | ||
| + | || || || Writing User Provided Data to Disk || || || || | ||
| + | |- | ||
| + | || || || Failure to Release Resources || || || || | ||
| + | |- | ||
| + | || || || Storing too Much Data in Session || || || || | ||
| + | |- | ||
| + | || Web Services Testing || || XML Structural Testing || || || || | ||
| + | |- | ||
| + | || || || XML content-level Testing || || || || | ||
| + | |- | ||
| + | || || || HTTP GET parameters/REST Testing || || || || | ||
| + | |- | ||
| + | || || || Naughty SOAP attachments || || || || | ||
| + | |- | ||
| + | || || || Replay Testing || || || || | ||
| + | |- | ||
| + | || AJAX Testing || || AJAX Vulnerabilities || || || || | ||
| + | |- | ||
| + | |} | ||
| + | |||
| + | |||
| + | |||
| − | |||
{{Category:OWASP Testing Project AoC}} | {{Category:OWASP Testing Project AoC}} | ||
| − | |||
Revision as of 18:26, 19 November 2006
OWASP Testing Guide v2 Table of Contents
| Category | Ref Number | Name | Finding | Affected Item | Comment/Solution | Risk Value |
| Information Gathering | Application Discovery | |||||
| Spidering and googling | ||||||
| Analisys of error code | ||||||
| SSL/TLS Testing | ||||||
| DB Listener Testing | ||||||
| File extensions handling | ||||||
| Old, backup and unreferenced files | ||||||
| Business logic testing | ||||||
| Authentication Testing | Default or guessable account | |||||
| Brute Force | ||||||
| Bypassing authentication schema | ||||||
| Directory traversal/file include | ||||||
| Vulnerable remember password and pwd reset | ||||||
| Logout and Browser Cache Management Testing | ||||||
| Session Management Testing | Session Management Schema | |||||
| Session Token Manipulation | ||||||
| Exposed Session Variables | ||||||
| Session Riding | ||||||
| HTTP Exploit | ||||||
| Data Validation Testing | Cross site scripting | |||||
| HTTP Methods and XST | ||||||
| SQL Injection | ||||||
| Stored procedure injection | ||||||
| ORM Injection | ||||||
| LDAP Injection | ||||||
| XML Injection | ||||||
| SSI Injection | ||||||
| XPath Injection | ||||||
| IMAP/SMTP Injection | ||||||
| Code Injection | ||||||
| OS Commanding | ||||||
| Buffer overflow | ||||||
| Incubated vulnerability | ||||||
| Denial of Service Testing | Locking Customer Accounts | |||||
| User Specified Object Allocation | ||||||
| User Input as a Loop Counter | ||||||
| Writing User Provided Data to Disk | ||||||
| Failure to Release Resources | ||||||
| Storing too Much Data in Session | ||||||
| Web Services Testing | XML Structural Testing | |||||
| XML content-level Testing | ||||||
| HTTP GET parameters/REST Testing | ||||||
| Naughty SOAP attachments | ||||||
| Replay Testing | ||||||
| AJAX Testing | AJAX Vulnerabilities |
OWASP Testing Guide v2
Here is the OWASP Testing Guide v2 Table of Contents