Vulnsy
Web Application28 items

Web Application Pentest Checklist

A structured penetration testing checklist for web applications covering all critical attack surfaces. This checklist guides testers through reconnaissance, vulnerability discovery, exploitation, and reporting phases aligned with OWASP and PTES methodologies.

OWASP Top 10OWASP WSTGPTESNIST SP 800-115
Progress: 0 of 28 items
0%
Commands
subfinder -d target.com -silent
amass enum -passive -d target.com
curl -s "https://crt.sh/?q=%25.target.com&output=json" | jq -r ".[].name_value" | sort -u
Commands
gobuster dir -u https://target.com -w /usr/share/wordlists/dirb/common.txt -t 50
ffuf -u https://target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt -mc 200,204,301,302,403
feroxbuster -u https://target.com -w /usr/share/seclists/Discovery/Web-Content/common.txt
Commands
whatweb -a 3 https://target.com
curl -sI https://target.com
Commands
curl -s https://target.com/robots.txt
curl -s https://target.com/sitemap.xml
curl -s https://target.com/.well-known/security.txt
Commands
katana -u https://target.com -jc -d 5
gau target.com | grep -E "\.js$"
Commands
sqlmap -u "https://target.com/page?id=1" --batch --risk=3 --level=5
sqlmap -r request.txt --batch --dbs
Evidence to capture

sqlmap output confirming the vulnerable parameter, DBMS version, and a screenshot of extracted database contents (or a benign proof such as `SELECT @@version`).

Evidence to capture

screenshot of the affected URL with the rendered XSS payload (e.g. an alert() box) and the raw HTTP request/response showing reflected input.

Commands
hydra -L users.txt -P passwords.txt https-post-form "/login:username=^USER^&password=^PASS^:F=invalid"
Evidence to capture

paired Burp requests from two different user accounts showing User A successfully reading or modifying User B's resource (with redacted PII as appropriate).

Evidence to capture

raw response showing internal-only content (e.g. AWS metadata at 169.254.169.254 or an internal admin page) returned through the vulnerable parameter.

Evidence to capture

side-by-side request/response pairs from a low-privilege account showing successful access to admin functionality, plus the resulting state change.

Evidence to capture

uploaded webshell URL plus screenshot/HTTP response demonstrating command execution (e.g. `id` output) on the application server.

Commands
curl -sI https://target.com
testssl.sh --headers https://target.com

Industries Using This Checklist

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial