Table of Contents
1. Frontispiece
2. Introduction
2.5 Threat Modeling
4.1.2 Fingerprint Web Server
4.1.10 Map Application Architecture
4.2.6 Test HTTP Methods
4.2.9 Test File Permission
4.2.10 Test for Subdomain Takeover
4.2.11 Test Cloud Storage
4.3.1 Test Role Definitions
4.5.5.1 Testing for OAuth Authorization Server Weaknesses
4.5.5.2 Testing for OAuth Client Weaknesses
4.6.7 Testing Session Timeout
4.6.10 Testing JSON Web Tokens
4.7.5.1 Testing for Oracle
4.7.5.2 Testing for MySQL
4.7.5.3 Testing for SQL Server
4.7.5.4 Testing PostgreSQL
4.7.5.5 Testing for MS Access
4.7.5.6 Testing for NoSQL Injection
4.7.5.7 Testing for ORM Injection
4.7.5.8 Testing for Client-side
4.7.11 Testing for Code Injection
4.7.11.1 Testing for File Inclusion
4.7.20 Testing for Mass Assignment
4.8.2 Testing for Stack Traces
4.10.3 Test Integrity Checks
4.10.4 Test for Process Timing
4.10.10 Test Payment Functionality
4.11 Client-side Testing
4.11.1.1 Testing for Self DOM Based Cross-Site Scripting
4.11.3 Testing for HTML Injection
4.11.5 Testing for CSS Injection
4.11.9 Testing for Clickjacking
4.11.10 Testing WebSockets
4.11.11 Testing Web Messaging
4.11.12 Testing Browser Storage
4.11.14 Testing for Reverse Tabnabbing
4.12 API Testing
4.12.1 Testing GraphQL
5. Reporting
5.2 Naming Schemes
Appendix A. Testing Tools Resource
Appendix B. Suggested Reading
Appendix C. Fuzz Vectors
Appendix D. Encoded Injection
Appendix E. History
Appendix F. Leveraging Dev Tools
Last updated