Http.
Session management.
Http cookies.
Handling user access.
How token are generated.
Access control.
SOAP service
SMTP injection
Canonicalization
Saitization
Error handling
User agent
host header
cookie header
pragma header
Content-Type header
Content-Length header
Allow header
Put and get method
Trace in http
Head functions
Arbitrary script
Rerefer header
User-agent header
Representational state transfer (REST)
General Headers
connection
content-encoding
content-length
content-type
transfer-encoding
REQUEST HEADERS
Accept
accept-encoding
authorization
cookie
host
if-modified-since
if-none-match
origin
referer
user-agent
RESPONSE HEADERS
access-control-allow-origin
cache-control
etag
expires
location
pragma
server
set-cookie
www-authenticate
x-frame-option
If-None-Match header
---------------------------------
Connect method
HTTP AUTHENTICATION
Basic
NTLM
Digest
Document Type Definition (DTD)
Web Services Description Language (WSDL)
redir parameter
Web 2.0
Different types of encoding systems
Naming scheme
Review of client and server-side code.
Java applet
ActiveX
Flash
Content management system (CMS)
Discover about hidden parameter in URL
Learn about parameters (request parameter, etc)
HTTP header
Out-of-band channel
servlet — Java servlets
n pls — Oracle Application Server PL/SQL
gateway
n cfdocs or cfide — Cold Fusion
n Silverstream — The Silverstream web server
n WebObjects or {function}.woa — Apple
WebObjects
n rails — Ruby on Rails
JSESSIONID — The Java Platform
n ASPSESSIONID — Microsoft IIS server
n ASP.NET_SessionId — Microsoft ASP.NET
n CFID/CFTOKEN — Cold Fusion
n PHPSESSID — PHP
Obfuscation scheme
Database interaction — SQL injection
File uploading and downloading — Path traversal
vulnerabilities, stored
Client-side validation — Checks may not be replicated on the
server
cross-site scripting
Display of user-supplied data — Cross-site scripting
Dynamic redirects — Redirection and header injection
attacks
Social networking features — username enumeration,
stored cross-site
scripting
Login — Username enumeration, weak passwords, ability to
use brute
force
Multistage login — Logic flaws
Session state — Predictable tokens, insecure handling of
tokens
Access controls — Horizontal and vertical privilege escalation
User impersonation functions — Privilege escalation
Use of cleartext communications — Session hijacking,
capture of credentials
and other sensitive data
Off-site links — Leakage of query string parameters in the
Referer
header
Interfaces to external systems — Shortcuts in the handling
of sessions
and/or access controls
Error messages — Information leakage
E-mail interaction — E-mail and/or command injection
Native code components or interaction — Buffer overflows
Use of third-party application components — Known
vulnerabilities
Identifiable web server software — Common configuration
weaknesses, known software bugs
Base 64 encoding-decoding