Bug Bounty Methodology - Web Vulnerabilities Checklist

apex
4 min readJan 11, 2022

--

Hello guys, it’s me again. I know malware analysis might be boring because of debugging and code analysis especially for the people who are just getting started. So, I decided to change the topics specifically to bug bounty and pentesting. Today, I will be discussing about the methodology one should follow before performing web app pentesting.

In every pentesting scenarios there are several hidden and obvious places that might be vulnerable. This post is meant to be a checklist to confirm that you have searched vulnerabilities in all the possible places.

Refer to below checklists for web app pentesting.

Proxies

Nowadays web applications usually uses some kind of intermediary proxies, those may be used to exploit vulnerabilities. These vulnerabilities need a vulnerable proxy to be in place, but they usually also need some extra vulnerability in the backend.

Checklist — Proxies ( Web App Pentest )

User Input -> Reflected Values

Most of the web applications will allow users to input some data that will be processed later. Depending on the structure of the data the server is expecting some vulnerabilities may or may not apply.

If the introduced data may somehow being reflected in the response, the page might be vulnerable to several issues.

Checklist — Reflected Values ( Web App Pentest )

Search Functionalities

If the functionality may be used to search some kind of data inside the backend, maybe you can use it to search arbitrary data.

Checklist — Search Functionalities ( Web App Pentest )

Forms, WebSockets and PostMsgs

When websocket, post message or a form allows user to perform actions, vulnerabilities may arise.

Checklist — Forms/WebSockets/PostMsgs ( Web App Pentest )

HTTP Headers

Depending on the HTTP headers given by the web server, some vulnerabilities might be present.

Checklist — HTTP Headers ( Web App Pentest )

Bypasses

There are several specific functionalities mentioned below, a more detailed explanation will be provided in the upcoming articles. For the time being, a checklist is provided below…

Checklist — Bypasses ( Web App Pentest )

Structured objects / Specific functionalities

Some functionalities will require the data to be structured on a very specific format (like a language serialized object or a XML). Therefore, it’s more easy to identify is the application might be vulnerable as it needs to be processing that kind of data. Some specific functionalities my be also vulnerable if a specific format of the input is used (like Email Header Injections).

Checklist — Specific Functionalities ( Web App Pentest )

Files

Functionalities that allow to upload files might be vulnerable to several issues. Functionalities that generates files including user input might execute unexpected code. Users that open files uploaded by users or automatically generated including user input might be compromised.

Checklist — Upload Vulnerabilities ( Web App Pentest )

External Identity Management

Other Helpful Vulnerabilities

The below mentioned are other helpful vulnerabilities and you can probably chain them in-order to have high impact vulnerabilities.

All the above mentioned vulnerabilities will be explained further in detail in upcoming articles.

UNTIL THEN ….

ADIOS!! See you folks on the other side…..

--

--

apex

I try to analyze ransomware attacks | Static Code Analysis | Privacy & Security Updates | Pen Testing | Bug Bounty