This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ID | Test name | Domain | Owasp API Top Ten | |
---|---|---|---|---|
1 | Test user enumeration (if applicable) | Authorization | A1, A3 | |
2 | Exploit vulnerabilities to gain unauthorized access | Authorization | A2 | |
3 | Transmission of sensitive information (token, credentials, etc.) in an insecure manner | Integrity/Confidentiality | A1 | |
4 | Test for specific data entry vulnerabilities | Data validation | A8 | |
5 | Perform fuzzing on all request parameters (sending malicious information, for example) | Data validation | A8 | |
6 | Test for injection vulnerabilities (SQLi, LDAP, XML, Xpath, XXE if applicable) | Data validation | A8 | |
7 | Testing for buffer overflow vulnerabilities | Data validation | A8 | |
8 | Test for logic failures (if applicable) | Data validation | A6 | |
9 | Test how the application behaves by receiving incomplete information | Data validation | A6 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ID,Test name,Domain,Owasp API Top Ten | |
1,Test user enumeration (if applicable),Authorization,"A1, A3" | |
2,Exploit vulnerabilities to gain unauthorized access,Authorization,A2 | |
3,"Transmission of sensitive information (token, credentials, etc.) in an insecure manner",Integrity/Confidentiality,A1 | |
4,Test for specific data entry vulnerabilities,Data validation,A8 | |
5,"Perform fuzzing on all request parameters (sending malicious information, for example)",Data validation,A8 | |
6,"Test for injection vulnerabilities (SQLi, LDAP, XML, Xpath, XXE if applicable)",Data validation,A8 | |
7,Testing for buffer overflow vulnerabilities,Data validation,A8 | |
8,Test for logic failures (if applicable),Data validation,A6 | |
9,Test how the application behaves by receiving incomplete information,Data validation,A6 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apt-get clean | |
apt-get update | |
apt-get upgrade -y | |
apt-get dist-upgrade -y | |
passwd | |
apt-get install chkrootkit | |
leafpad /etc/hostname | |
leafpad /etc/hosts | |
updatedb | |
cat /etc/shadow | awk -F: '($2==""){print $1}' > ./no_password_users.txt |