Skip to content

A simple, beginner-friendly guide to conducting a web application pentest

License

Notifications You must be signed in to change notification settings

jmw1g19/Web-App-Pentest-Methodology

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Web App Pentest Methodology

Introduction

This methodology covers the basics of conducting a web application pentest. It is aimed at beginners and those who want a refresher on the basics of conducting such an assessment.

It assumes a scoping exercise has been conducted prior to the engagement beginning proper. The methodology covers most common web application vulnerabilities and provides guidance for approaching the relevant part of the test. Optional comments include further information on exploits and common incorrect approaches to securing applications from select vulnerabilities.

This methodology works for any type of pentest; regardless of whether you have access to the source code for the application. The methodology aims to focus thinking on the business-side of cyber security by ensuring word conducted is contextualised for the relevant client.

Large parts of the methodology are derived from the OWASP Web Security Testing Guide, supplemented with my own knowledge and experience.

How to Use

The docx folder contains the methodology as a .docx file.

The pdf folder contains the methodology as a .pdf file, with separate versions which include and do not include the extra comments.

Simply fill in the document as you proceed! There is no right or wrong way to document your findings.

Version History

  • v0.5 - Initial draft

Upcoming versions: extra comments and proofreading

About

A simple, beginner-friendly guide to conducting a web application pentest

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published