OWASP Testing Guide v4 Table of Contents

From OWASP
Revision as of 13:35, 5 October 2012 by Mmeucci (Talk | contribs)

Jump to: navigation, search


This is DRAFT of the table of content of the New Testing Guide v4.

You can download the stable version here

Back to the OWASP Testing Guide Project: http://www.owasp.org/index.php/OWASP_Testing_Project

Updated: 5th October 2012

Contributors List



The following is a DRAFT of the Toc based on the feedback already received.

Table of Contents

Foreword by OWASP Chair

[To review--> OWASP Chair]

1. Frontispiece

[To review--> Mat]

1.1 About the OWASP Testing Guide Project [To review--> Mat]

1.2 About The Open Web Application Security Project [To review--> ]


2. Introduction

2.1 The OWASP Testing Project

2.2 Principles of Testing

2.3 Testing Techniques Explained

2.4 Security requirements test derivation,functional and non functional test requirements, and test cases through use and misuse cases

2.5 Security test data analysis and reporting: root cause identification and business/role case test data reporting

3. The OWASP Testing Framework

3.1. Overview

3.2. Phase 1: Before Development Begins

3.3. Phase 2: During Definition and Design

3.4. Phase 3: During Development

3.5. Phase 4: During Deployment

3.6. Phase 5: Maintenance and Operations

3.7. A Typical SDLC Testing Workflow

4. Web Application Penetration Testing

4.1 Introduction and Objectives [To review--> Mat]

4.1.1 Testing Checklist [To review at the end of brainstorming --> Mat]

4.2 Information Gathering [To review--> contributor here]

4.2.1 Spiders, Robots and Crawlers (OWASP-IG-001)

4.2.2 Search Engine Discovery/Reconnaissance (OWASP-IG-002)

4.2.3 Identify application entry points (OWASP-IG-003)

4.2.4 Testing for Web Application Fingerprint (OWASP-IG-004)

4.2.5 Application Discovery (OWASP-IG-005)

4.2.6 Analysis of Error Codes (OWASP-IG-006)

4.3 Configuration and Deploy Management Testing

4.3.1 Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)

4.3.2 Testing for Application Configuration Management weakness (OWASP-CM-002)

4.3.3 Testing for File Extensions Handling (OWASP-CM-003)

4.3.4 Old, Backup and Unreferenced Files (OWASP-CM-004)

4.3.5 Infrastructure and Application Admin Interfaces (OWASP-CM-005)

4.3.6 Testing for Bad HTTP Methods (OWASP-CM-006)[new - Abian Blome]

> Informative Error Messages [MAT NOTE: in info gathering]

4.3.7 Testing for Database credentials/connection strings available (OWASP-CM-007)

4.3.8 Testing for Content Security Policy weakness (OWASP-CM-008)[New!]

4.3.9 Testing for Missing HSTS header (OWASP-CM-009)[New!]

4.3.10 Testing for RIA policy files weakness (OWASP-CM-010) [New!]

> Incorrect time[New! MAT NOTE: explain the test in detail please]

> Unpatched components and libraries (e.g. JavaScript libraries)[New! NOTE: tu discuss it]

> Test data in production systems (and vice versa)[New! MAT NOTE: this is not a particular test that could find a vulnerability]

4.4 Authentication Testing

4.4.1 Testing for Credentials transport over an encrypted channel (OWASP-AT-001) [Robert Winkel]

4.4.2 Testing for user enumeration and guessable user account (OWASP-AT-002) [Robert Winkel]

4.4.3 Testing for default credentials (OWASP-AT-003)

4.4.4 Testing for Weak lock out mechanism (OWASP-AT-004) [New! - Robert Winkel]

> Account lockout DoS [New! - Robert Winkel - we can put it in the 4.4.4]

4.4.5 Testing for bypassing authentication schema (OWASP-AT-005)

4.4.6 Testing for vulnerable remember password functionality (OWASP-AT-006) [Robert Winkel]

4.4.7 Testing for Browser cache weakness (OWASP-AT-007) [New! - Abian Blome]

4.4.8 Testing for Weak password policy (OWASP-AT-008) [New! - Robert Winkel]

4.4.9 Testing for Weak or unenforced username policy (OWASP-AT-009) [New! - Robert Winkel]

> Weak security question/answer [New! - Robert Winkel - MAT Note: same as AT-006]

4.4.10 Testing for failure to restrict access to authenticated resource (OWASP-AT-010) [New!]

4.4.11 Testing for weak password change or reset functionalities (OWASP-AT-011) [New! - Robert Winkel]

4.4.12 Testing for CAPTCHA (OWASP-AT-012)

> Weaker authentication in alternative channel (e.g. mobile app, IVR, help desk) [New!: MAT Note: to explain better the kind of test to perform please]


4.5 Session Management Testing

4.5.1 Testing for Bypassing Session Management Schema (OWASP-SM-001)

4.5.2 Testing for Cookies attributes (Cookies are set not ‘HTTP Only’, ‘Secure’, and no time validity) (OWASP-SM-002)

4.5.3 Testing for Session Fixation (OWASP-SM-003)

4.5.4 Testing for Exposed Session Variables (OWASP-SM-004)

4.5.5 Testing for Cross Site Request Forgery (CSRF) (OWASP-SM-005)

> Weak Session Token (MAT NOTE included in 4.5.1)

Testing for Session token not restricted properly (such as domain or path not set properly) [New! - Abian Blome]

> Session passed over http (NOTE: included in SM-004) [New!]

Testing for logout functionality (OWASP-SM-00x)

>Session token not removed on server after logout [New!: NOTE included in the above test]

> Logout function not properly implemented (NOTE:same above)

> Persistent session token [New! NOTE: this is not a vulnerability if session time out is correctly performed]

4.5.x Testing for Session puzzling [New! - Abian Blome]

> Missing user-viewable log of authentication events [NOTE: needs more details: which test perform?]

4.6 Authorization Testing

Bypassing authorization schema
Directory traversal/file include [Juan Galiana]
Privilege Escalation [Irene Abezgauz]
Insecure Direct Object References [Irene Abezgauz]
Failure to Restrict access to authorized resource [New!]
Server component has excessive privileges (e.g. indexing service, reporting interface, file generator)[New!]
Lack of enforcement of application entry points (including exposure of objects)[New!]

4.7 Business Logic Testing (OWASP-BL-001) [To review--> contributor here] Business Logic

Business logic data validation[New!]
Ability to forge requests[New!]
Lack of integrity checks (e.g. overwriting updates) [New!]
Lack of tamper evidence[New!]
Use of untrusted time source[New!]
Lack of limits to excessive rate (speed) of use[New!]
Lack of limits to size of request[New!]
Lack of limit to number of times a function can be used[New!]
Bypass of correct sequence[New!]
Missing user-viewable log of actvity[New!]
Self-hosted payment cardholder data processing[New!]
Lack of security incident reporting information[New!]
Defenses against application mis-use[New!]

4.8 Data Validation Testing

Reflected XSS
Stored XSS
HTTP Verb Tampering [Brad Causey]
HTTP Parameter pollution [Brad Causey]
Unvalidated Redirects and Forwards [Brad Causey]
SQL Injection [Brad Causey]
LDAP Injection
ORM Injection
XML Injection
SSI Injection
XPath Injection
SOAP Injection
IMAP/SMTP Injection
Code Injection
NoSQL injection[New!]
OS Commanding [Juan Galiana]
Buffer overflow
Incubated vulnerability
HTTP Splitting/Smuggling [Juan Galiana]
Regular expression DoS[New!]

Testing for Data Encryption (New!)

[[Testing for Insecure encryption usage | x.x.1
x.x.2 Testing for Weak SSL/TSL Ciphers, Insufficient Transport Layer Protection (OWASP-EN-002) --> [[Testing for Cacheable HTTPS Response | x.x.3 Testing for Cacheable HTTPS Response
Cache directives insecure
--> Testing for Insecure Cryptographic Storage [put in x.x.1]
[[Testing for Sensitive information sent via unencrypted channels | x.x.4

XML Interpreter? (New!)

Testing for Weak XML Structure Testing for XML content-level WS HTTP GET parameters/REST WS Naughty SOAP attachments WS Replay Testing

Client Side Testing (New!)

Testing for DOM Based XSS
Testing for HTML5 [Juan Galiana]
Testing for Cross Site Flashing
Testing for ClickHijacking

5. Writing Reports: value the real risk

5.1 How to value the real risk [To review--> contributor here]

5.2 How to write the report of the testing [To review--> contributor here]

Appendix A: Testing Tools

  • Black Box Testing Tools [To review--> Amro. We need only tools fo webapp testing]

Appendix B: Suggested Reading

  • Whitepapers [To review--> contributor here]
  • Books [To review--> contributor here]
  • Useful Websites [To review--> contributor here]

Appendix C: Fuzz Vectors

  • Fuzz Categories [To review--> contributor here]


Appendix D: Encoded Injection

[To review--> contributor here]