Security Checklist

Web Application Penetration Testing

Freedium
Total Progress 0.0%
1

Reconnaissance

0/25
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
2

Registration Vulnerabilities

0/13
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
3

Authentication Testing

0/34
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
4

Session Management

0/19
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
5

IDOR (Insecure Direct Object Reference)

0/73
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
6

Business Logic Vulnerabilities

0/66
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
7

CSRF Vulnerabilities

0/40
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
8

Remote Code Execution (RCE)

0/43
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
9

Cross-Site Scripting (XSS)

0/419
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
10

SQL Injection Testing

0/140
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
11

Bug Bounty Tools

0/24
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
12

Reconnaissance Tools

0/92
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
13

Cloud Security Testing

0/56
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
14

Kubernetes Security

0/42
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
15

Server-Side Request Forgery

0/54
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
16

Local File Inclusion (LFI)

0/59
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
17

Admin Panel Testing

0/52
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
18

Account Takeover

0/57
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
19

XML External Entity Attacks (XXE)

0/56
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
20

Deserialization

0/29
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
21

API Security

0/46
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
22

File Upload Vulnerabilities

0/59
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
23

Information Disclosure

0/86
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
24

403 and waf Bypass Techniques

0/57
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
25

Platform-Specific Vulnerabilities

0/71
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
26

Rate Limiting & DoS

0/42
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
27

Log4j Vulnerability

0/38
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup
Writeup