This page contains a checklist of the tasks you typically need to perform when carrying out a comprehensive attack against a web application. You can use this as a quick reminder of the areas you need to cover. For more detail, and the specific action steps involved, refer to the full methodology in Chapter 21 (or Chapter 20 in the first edition).

Recon and analysis












Test handling of access



























Test handling of input


















Test application logic









Assess application hosting










Miscellaneous tests











Copyright © 2011 Dafydd Stuttard and Marcus Pinto. All rights reserved.