3.6 More HOW and WHAT! (still work in progress)

TBD soon! (But those are things you should already know and do during other pentests)

User Login & Session Management

How to test?

For each penetration test, ALWAYS demand at least two user accounts. If different levels of privileges (read-only, write permissions or full admin) exist - at least one user per level.

  • Login with the provided user credentials

    • Have a look at the request (what parameters are transmitted, ...).

      • Tweak around with them (i.e. SQLi against the backend)

      • Is the connection to the backend encrypted (SSL in place)?

      • Do they get stored?

        • Where do they get stored?

        • How do they get stored? (Clear-text vs. encoding vs. encryption)

          • At want point do they get decrypted/-coded?

  • Switch tokens or other session values with other logged in users

    • Are the tokens bound to the session or do they need to be valid only?

    • Decode the token and check what kind of sensitive information is stored within

  • Logout

    • Reuse old tokens and test if they are still valid as well

What to report?

Access Control

How to test?

  • Observe the activity-flow

    • What activity will start after logging in?

    • Can you open this activity even without being logged in?

      • Only worth reporting if you are able to see sensitive information without any authentication

    • Can you access this activity without necessary permissions? (i.e. admin interface)

      • Are you even able to perform any admin actions?

  • Access content of other users

    • Images, Videos, Messages, ...

What to report?

Last updated

Was this helpful?