Skip to content

Commit 4a4e150

Browse files
committed
improve checklist
1 parent 8fffdb8 commit 4a4e150

File tree

1 file changed

+79
-0
lines changed

1 file changed

+79
-0
lines changed

src/pentesting-web/web-vulnerabilities-methodology.md

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,10 @@ In every Web Pentest, there are **several hidden and obvious places that might b
1212
1313
- [ ] [**Abusing hop-by-hop headers**](abusing-hop-by-hop-headers.md)
1414
- [ ] [**Cache Poisoning/Cache Deception**](cache-deception/index.html)
15+
- [ ] [**HTTP Connection Contamination**](http-connection-contamination.md)
16+
- [ ] [**HTTP Connection Request Smuggling**](http-connection-request-smuggling.md)
1517
- [ ] [**HTTP Request Smuggling**](http-request-smuggling/)
18+
- [ ] [**HTTP Response Smuggling / Desync**](http-response-smuggling-desync.md)
1619
- [ ] [**H2C Smuggling**](h2c-smuggling.md)
1720
- [ ] [**Server Side Inclusion/Edge Side Inclusion**](server-side-inclusion-edge-side-inclusion-injection.md)
1821
- [ ] [**Uncovering Cloudflare**](../network-services-pentesting/pentesting-web/uncovering-cloudflare.md)
@@ -29,6 +32,7 @@ In every Web Pentest, there are **several hidden and obvious places that might b
2932

3033
If the introduced data may somehow be reflected in the response, the page might be vulnerable to several issues.
3134

35+
- [ ] [**Client Side Path Traversal**](client-side-path-traversal.md)
3236
- [ ] [**Client Side Template Injection**](client-side-template-injection-csti.md)
3337
- [ ] [**Command Injection**](command-injection.md)
3438
- [ ] [**CRLF**](crlf-0d-0a.md)
@@ -61,6 +65,8 @@ If the functionality may be used to search some kind of data inside the backend,
6165
- [ ] [**LDAP Injection**](ldap-injection.md)
6266
- [ ] [**ReDoS**](regular-expression-denial-of-service-redos.md)
6367
- [ ] [**SQL Injection**](sql-injection/index.html)
68+
- [ ] [**ORM Injection**](orm-injection.md)
69+
- [ ] [**RSQL Injection**](rsql-injection.md)
6470
- [ ] [**XPATH Injection**](xpath-injection.md)
6571

6672
### **Forms, WebSockets and PostMsgs**
@@ -69,13 +75,15 @@ When a websocket posts a message or a form allowing users to perform actions vul
6975

7076
- [ ] [**Cross Site Request Forgery**](csrf-cross-site-request-forgery.md)
7177
- [ ] [**Cross-site WebSocket hijacking (CSWSH)**](websocket-attacks.md)
78+
- [ ] [**Phone Number Injections**](phone-number-injections.md)
7279
- [ ] [**PostMessage Vulnerabilities**](postmessage-vulnerabilities/index.html)
7380

7481
### **HTTP Headers**
7582

7683
Depending on the HTTP headers given by the web server some vulnerabilities might be present.
7784

7885
- [ ] [**Clickjacking**](clickjacking.md)
86+
- [ ] [**Iframe Traps / Click Isolation**](iframe-traps.md)
7987
- [ ] [**Content Security Policy bypass**](content-security-policy-csp-bypass/index.html)
8088
- [ ] [**Cookies Hacking**](hacking-with-cookies/index.html)
8189
- [ ] [**CORS - Misconfigurations & Bypass**](cors-bypass.md)
@@ -87,6 +95,7 @@ There are several specific functionalities where some workarounds might be usefu
8795
- [ ] [**2FA/OTP Bypass**](2fa-bypass.md)
8896
- [ ] [**Bypass Payment Process**](bypass-payment-process.md)
8997
- [ ] [**Captcha Bypass**](captcha-bypass.md)
98+
- [ ] [**Account Takeover Playbooks**](account-takeover.md)
9099
- [ ] [**Login Bypass**](login-bypass/index.html)
91100
- [ ] [**Race Condition**](race-condition.md)
92101
- [ ] [**Rate Limit Bypass**](rate-limit-bypass.md)
@@ -101,6 +110,7 @@ Some **specific functionalities** may be also vulnerable if a **specific format
101110
- [ ] [**Deserialization**](deserialization/index.html)
102111
- [ ] [**Email Header Injection**](email-injections.md)
103112
- [ ] [**JWT Vulnerabilities**](hacking-jwt-json-web-tokens.md)
113+
- [ ] [**JSON / XML / YAML Hacking**](json-xml-yaml-hacking.md)
104114
- [ ] [**XML External Entity**](xxe-xee-xml-external-entity.md)
105115
- [ ] [**GraphQL Attacks**](../network-services-pentesting/pentesting-web/graphql.md)
106116
- [ ] [**gRPC-Web Attacks**](grpc-web-pentest.md)
@@ -131,5 +141,74 @@ These vulnerabilities might help to exploit other vulnerabilities.
131141
- [ ] [**Parameter Pollution**](parameter-pollution.md)
132142
- [ ] [**Unicode Normalization vulnerability**](unicode-injection/index.html)
133143

144+
### **Web Servers & Middleware**
145+
146+
Misconfigurations in the edge stack often unlock more impactful bugs in the application layer.
147+
148+
- [ ] [**Apache**](../network-services-pentesting/pentesting-web/apache.md)
149+
- [ ] [**Nginx**](../network-services-pentesting/pentesting-web/nginx.md)
150+
- [ ] [**IIS**](../network-services-pentesting/pentesting-web/iis-internet-information-services.md)
151+
- [ ] [**Tomcat**](../network-services-pentesting/pentesting-web/tomcat/)
152+
- [ ] [**Spring Actuators**](../network-services-pentesting/pentesting-web/spring-actuators.md)
153+
- [ ] [**PUT Method / WebDAV**](../network-services-pentesting/pentesting-web/put-method-webdav.md)
154+
- [ ] [**Special HTTP Headers**](../network-services-pentesting/pentesting-web/special-http-headers.md)
155+
- [ ] [**WSGI Deployment**](../network-services-pentesting/pentesting-web/wsgi.md)
156+
- [ ] [**Werkzeug Debug Exposure**](../network-services-pentesting/pentesting-web/werkzeug.md)
157+
158+
### **Application Frameworks & Stacks**
159+
160+
Framework-specific primitives frequently expose gadgets, dangerous defaults, or framework-owned endpoints.
161+
162+
- [ ] [**Django**](../network-services-pentesting/pentesting-web/django.md)
163+
- [ ] [**Flask**](../network-services-pentesting/pentesting-web/flask.md)
164+
- [ ] [**NodeJS / Express**](../network-services-pentesting/pentesting-web/nodejs-express.md)
165+
- [ ] [**Angular**](../network-services-pentesting/pentesting-web/angular.md)
166+
- [ ] [**Vue / Nuxt**](../network-services-pentesting/pentesting-web/vuejs.md)
167+
- [ ] [**Next.js**](../network-services-pentesting/pentesting-web/nextjs.md)
168+
- [ ] [**Laravel**](../network-services-pentesting/pentesting-web/laravel.md)
169+
- [ ] [**Symfony**](../network-services-pentesting/pentesting-web/symphony.md)
170+
171+
### **CMS, SaaS & Managed Platforms**
172+
173+
High-surface products often ship with known exploits, weak plugins, or privileged admin endpoints.
174+
175+
- [ ] [**WordPress**](../network-services-pentesting/pentesting-web/wordpress.md)
176+
- [ ] [**Joomla**](../network-services-pentesting/pentesting-web/joomla.md)
177+
- [ ] [**Drupal**](../network-services-pentesting/pentesting-web/drupal/)
178+
- [ ] [**Moodle**](../network-services-pentesting/pentesting-web/moodle.md)
179+
- [ ] [**Prestashop**](../network-services-pentesting/pentesting-web/prestashop.md)
180+
- [ ] [**Atlassian Jira**](../network-services-pentesting/pentesting-web/jira.md)
181+
- [ ] [**Grafana**](../network-services-pentesting/pentesting-web/grafana.md)
182+
- [ ] [**Rocket.Chat**](../network-services-pentesting/pentesting-web/rocket-chat.md)
183+
- [ ] [**Zabbix**](../network-services-pentesting/pentesting-web/zabbix.md)
184+
- [ ] [**Microsoft SharePoint**](../network-services-pentesting/pentesting-web/microsoft-sharepoint.md)
185+
- [ ] [**Sitecore**](../network-services-pentesting/pentesting-web/sitecore/)
186+
187+
### **APIs, Buckets & Integrations**
188+
189+
Server-side helpers and third-party integrations can expose file parsing or storage-layer weaknesses.
190+
191+
- [ ] [**Web API Pentesting**](../network-services-pentesting/pentesting-web/web-api-pentesting.md)
192+
- [ ] [**Storage Buckets & Firebase**](../network-services-pentesting/pentesting-web/buckets/)
193+
- [ ] [**Imagemagick Security**](../network-services-pentesting/pentesting-web/imagemagick-security.md)
194+
- [ ] [**Artifactory & Package Registries**](../network-services-pentesting/pentesting-web/artifactory-hacking-guide.md)
195+
- [ ] [**Code Review Tooling**](../network-services-pentesting/pentesting-web/code-review-tools.md)
196+
197+
### **Supply Chain & Identifier Abuse**
198+
199+
Attacks that target build pipelines or predictable identifiers can become the initial foothold before exploiting traditional bugs.
200+
201+
- [ ] [**Dependency Confusion**](dependency-confusion.md)
202+
- [ ] [**Timing Attacks**](timing-attacks.md)
203+
- [ ] [**UUID Insecurities**](uuid-insecurities.md)
204+
205+
### **Web3, Extensions & Tooling**
206+
207+
Modern applications extend into browsers, wallets, and automation pipelines—keep these vectors in scope.
208+
209+
- [ ] [**dApps / Decentralized Applications**](dapps-DecentralizedApplications.md)
210+
- [ ] [**Browser Extension Pentesting**](browser-extension-pentesting-methodology/)
211+
- [ ] [**wfuzz Web Fuzzing**](web-tool-wfuzz.md)
212+
134213

135214
{{#include ../banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)