OWASP Testing Guide v4 Table of Contents
This is the DRAFT of the table of content of the New Testing Guide v4.
You can download the stable version v3 here
Back to the OWASP Testing Guide Project: http://www.owasp.org/index.php/OWASP_Testing_Project
Updated: 15th February 2013
The following is a DRAFT of the Toc based on the feedback already received.
Table of Contents
[To review--> Eoin Keary -> Done!!]
[To review--> Mat]
1.1 About the OWASP Testing Guide Project [To review--> Mat]
1.2 About The Open Web Application Security Project [To review--> ]
2.1 The OWASP Testing Project
2.2 Principles of Testing
2.3 Testing Techniques Explained
3.2. Phase 1: Before Development Begins
3.3. Phase 2: During Definition and Design
3.4. Phase 3: During Development
3.5. Phase 4: During Deployment
3.6. Phase 5: Maintenance and Operations
3.7. A Typical SDLC Testing Workflow
4.1 Introduction and Objectives [To review--> Mat]
4.1.1 Testing Checklist [To review at the end of brainstorming --> Mat]
4.2 Information Gathering [Andrew Muller]
4.2.1 Conduct Search Engine Discovery and Reconnaissance for Information Leakage (OTG-INFO-001) formerly "Search Engine Discovery/Reconnaissance (OWASP-IG-002)"
4.2.2 Fingerprint Web Server (OTG-INFO-002) formerly "Testing for Web Application Fingerprint (OWASP-IG-004)"
4.2.3 Review Webserver Metafiles for Information Leakage (OTG-INFO-003) formerly "Spiders, Robots and Crawlers (OWASP-IG-001)"
4.2.4 Enumerate Applications on Webserver (OTG-INFO-004) formerly "Application Discovery (OWASP-IG-005)"
4.2.5 Review Webpage Comments and Metadata for Information Leakage (OTG-INFO-005) formerly "Review webpage comments and metadata(OWASP-IG-007)"
4.2.6 Identify application entry points (OTG-INFO-006) formerly "Identify application entry points (OWASP-IG-003)"
4.2.7 Identify application exit/handover points (OTG-INFO-007) formerly "Identify application exit/handover points (OWASP-IG-008)"
4.2.8 Map execution paths through application (OTG-INFO-008) formerly "Map execution paths through application (OWASP-IG-009)"
4.2.9 Fingerprint Web Application Framework (OTG-INFO-009) formerly "Testing for Web Application Fingerprint (OWASP-IG-010)"
4.2.10 Fingerprint Web Application (OTG-INFO-010) formerly "Testing for Web Application Fingerprint (OWASP-IG-010)"
4.2.11 Map Network and Application Architecture (OTG-INFO-011) formerly "Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)"
4.3.1 Test Network/Infrastructure Configuration (OTG-CONFIG-001) formerly "Testing for Infrastructure Configuration Management Testing weakness (OWASP-CM-001)"
4.3.2 Test Application Platform Configuration (OTG-CONFIG-002 formerly "Testing for Application Configuration Management weakness (OWASP-CM-002)"
4.3.3 Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) formerly "Testing for File Extensions Handling (OWASP-CM-003)"
4.3.4 Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) formerly "Old, Backup and Unreferenced Files (OWASP-CM-004)"
4.3.5 Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) formerly "Infrastructure and Application Admin Interfaces (OWASP-CM-005)"
4.3.6 Test HTTP Methods (OTG-CONFIG-006) formerly "Testing for Bad HTTP Methods (OWASP-CM-006)"
4.3.7 Testing for Database credentials/connection strings available (OTG-CONFIG-007) formerly "Testing for Database credentials/connection strings available (OWASP-CM-007)"
4.3.8 Test Content Security Policy (OTG-CONFIG-008) formerly "Testing for Content Security Policy weakness (OWASP-CM-008)"
4.3.9 Test HTTP Strict Transport Security (OTG-CONFIG-009) formerly "Testing for Missing HSTS header (OWASP-CM-009)"
4.3.11 Test RIA cross domain policy (OTG-CONFIG-011) formerly "Testing for RIA policy files weakness (OWASP-CM-010)"
4.3.12 Test time synchronisation (OTG-CONFIG-012) formerly "Incorrect time"
4.4.4 Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) formerly "Testing for Account Enumeration and Guessable User Account (OWASP-AT-002)"
4.4.5 Testing for Weak or unenforced username policy (OTG-IDENT-005) formerly "Testing for Weak or unenforced username policy (OWASP-AT-009)
4.4.3 Testing for default credentials (OWASP-AT-003) [Davide Danelon]
4.4.4 Testing for Weak lock out mechanism (OWASP-AT-004) [New! - Robert Winkel]
> Account lockout DoS [New! - Robert Winkel - we can put it in the 4.4.4]
4.4.7 Testing for Browser cache weakness (OWASP-AT-007) [New! - Abian Blome]
4.4.8 Testing for Weak password policy (OWASP-AT-008) [New! - Robert Winkel]
4.4.9 Testing for Weak or unenforced username policy (OWASP-AT-009) [New! - Robert Winkel]
> Weak security question/answer [New! - Robert Winkel - MAT Note: same as AT-006]
4.4.10 Testing for failure to restrict access to authenticated resource (OWASP-AT-010) [New! - This seems better suited to the Authorization test cases (Andrew Muller)]
4.4.11 Testing for weak password change or reset functionalities (OWASP-AT-011) [New! - Robert Winkel]
4.4.12 Testing for CAPTCHA (OWASP-AT-012) [Note: Andrew Muller - CAPTCHA's objective is not authentication but to test humanness. This could be moved to Business Logic or the now deleted Denial of Service section]
> Weaker authentication in alternative channel (e.g. mobile app, IVR, help desk) [New!: MAT Note: to explain better the kind of test to perform please]
4.5.3 Testing for Session Fixation (OWASP-SM-003) [Amro AlOlaqi]
4.5.4 Testing for Exposed Session Variables (OWASP-SM-004) [Amro AlOlaqi]
> Weak Session Token (MAT NOTE included in 4.5.1)
> Session passed over http (NOTE: included in SM-004) [New!]
>Session token not removed on server after logout [New!: NOTE included in the above test]
> Logout function not properly implemented (NOTE:same above)
> Persistent session token [New! NOTE: this is not a vulnerability if session time out is correctly performed]
4.5.8 Testing for Session puzzling (OWASP-SM-008) [New! - Abian Blome]
> Missing user-viewable log of authentication events [NOTE: needs more details: which test perform?]
> Establishment of multiple sessions with same credentials [New! - Andrew Muller]
> Server component has excessive privileges (e.g. indexing service, reporting interface, file generator)[New!]
> Lack of enforcement of application entry points (including exposure of objects)[New!]
4.7 Business Logic Testing (OWASP-BL-001) [To review--> David Fern] Business Logic
Business logic data validation[New!] NOTE MAT: to discuss this section
Ability to forge requests[New!]
Lack of integrity checks (e.g. overwriting updates) [New!]
Lack of tamper evidence[New!]
Use of untrusted time source[New!]
Lack of limits to excessive rate (speed) of use[New!]
Lack of limits to size of request[New!]
Lack of limit to number of times a function can be used[New!]
Bypass of correct sequence[New!]
Missing user-viewable log of activity[New!]
Self-hosted payment cardholder data processing[New!]
Lack of security incident reporting information[New!]
Defenses against application mis-use[New!]
> Regular expression DoS[New!] note: to understand better
> XML DoS [New! - Andrew Muller]
> [[Testing for Cacheable HTTPS Response | x.x.3 Testing for Cacheable HTTPS Response
Cache directives insecure
> Testing for Insecure Cryptographic Storage [put in x.x.1]
[[Testing for Sensitive information sent via unencrypted channels | x.x.4
4.10 Web Service Testing [Tom Eston]
4.11 Client Side Testing [New!]
5.1 How to value the real risk [To review--> Amro AlOlaqi]
5.2 How to write the report of the testing [To review--> Amro AlOlaqi]
- Black Box Testing Tools [To review--> Amro AlOlaqi]
- Whitepapers [To review--> David Fern]
- Books [To review--> David Fern]
- Useful Websites [To review--> David Fern]
- Fuzz Categories [To review--> Amro AlOlaqi]
[To review--> Amro AlOlaqi]