UsefulLinks
Computer Science
Cybersecurity
Web Application Penetration Testing
1. Introduction to Web Application Penetration Testing
2. Foundational Web Technologies
3. The Penetration Testing Methodology
4. Setting Up a Testing Environment
5. Information Gathering and Application Mapping
6. Server-Side Vulnerabilities
7. Client-Side Vulnerabilities
8. Authentication and Session Management Testing
9. Application Logic Testing
10. Web Services and API Security Testing
11. Advanced Attack Techniques
12. Reporting and Remediation
8.
Authentication and Session Management Testing
8.1.
Authentication Mechanism Analysis
8.1.1.
Username Enumeration
8.1.1.1.
Response Time Analysis
8.1.1.2.
Error Message Differences
8.1.1.3.
Account Lockout Behavior
8.1.2.
Password Policy Testing
8.1.2.1.
Complexity Requirements
8.1.2.2.
Length Restrictions
8.1.2.3.
Character Set Limitations
8.1.3.
Multi-Factor Authentication Testing
8.1.3.1.
SMS-Based MFA Bypass
8.1.3.2.
TOTP Implementation Flaws
8.1.3.3.
Backup Code Vulnerabilities
8.1.4.
Single Sign-On Testing
8.1.4.1.
SAML Assertion Manipulation
8.1.4.2.
OAuth Flow Vulnerabilities
8.1.4.3.
JWT Token Analysis
8.2.
Session Token Security
8.2.1.
Token Generation Analysis
8.2.1.1.
Randomness Testing
8.2.1.2.
Predictability Assessment
8.2.1.3.
Entropy Measurement
8.2.2.
Token Transmission Security
8.2.2.1.
HTTPS Enforcement
8.2.2.2.
Secure Cookie Attributes
8.2.2.3.
Token Exposure Risks
8.2.3.
Session Lifecycle Management
8.2.3.1.
Session Creation
8.2.3.2.
Session Renewal
8.2.3.3.
Session Termination
8.2.3.4.
Session Timeout
8.3.
Session Attacks
8.3.1.
Session Fixation
8.3.1.1.
Pre-Authentication Fixation
8.3.1.2.
Post-Authentication Fixation
8.3.2.
Session Hijacking
8.3.2.1.
Network-Based Hijacking
8.3.2.2.
Cross-Site Scripting Hijacking
8.3.2.3.
Man-in-the-Middle Attacks
8.3.3.
Session Replay Attacks
8.3.4.
Concurrent Session Management
8.4.
JSON Web Token Vulnerabilities
8.4.1.
Algorithm Confusion Attacks
8.4.1.1.
None Algorithm Bypass
8.4.1.2.
HMAC to RSA Confusion
8.4.2.
Weak Secret Key Attacks
8.4.2.1.
Dictionary Attacks
8.4.2.2.
Brute-Force Attacks
8.4.3.
Token Manipulation
8.4.3.1.
Header Manipulation
8.4.3.2.
Payload Manipulation
8.4.3.3.
Signature Stripping
8.4.4.
Token Storage and Transmission
8.4.5.
Prevention and Mitigation
Previous
7. Client-Side Vulnerabilities
Go to top
Next
9. Application Logic Testing