Web Application28 items
OWASP Top 10 Testing Checklist
A structured testing checklist aligned with the OWASP Top 10 2021 categories. Each phase covers specific vulnerability classes with concrete test cases that security testers can execute to verify application resilience against the most critical web application risks.
OWASP Top 10 2021OWASP WSTGASVS 4.0
Progress: 0 of 28 items
0%
Evidence to capture
request from a low-privileged user successfully invoking an admin endpoint, with the response showing the privileged data or action.
Commands
curl -I -H "Origin: https://evil.com" https://target.com/api/meReferences
References
Commands
testssl.sh https://target.comsslyze --regular target.comReferences
References
References
Commands
sqlmap -u "https://target.com/page?id=1" --batch --risk=3 --level=5References
Commands
tplmap -u "https://target.com/?name=test"References
References
Commands
curl -sI https://target.comReferences
Commands
npm auditdependency-check --project target --scan ./trivy fs .Commands
ysoserial CommonsCollections5 "id" | base64Evidence to capture
response from the vulnerable parameter showing internal-only data (e.g. AWS metadata service contents at 169.254.169.254/latest/meta-data/).