Searh on shodan or Censys for any Domain/Sub that have WAF and see by wafw00f tool If this IP dosen't Implement WAF.
Content Spoofing
Broken Link Hijacking
Use this extension to find broken links.
Email HTML Injection
I was able to achieve this by injecting the following code into all input fields I encountered: <a href="https://evil.com">Click Here to get $100</a>. I then triggered an action on the website that resulted in an email being sent to me. To my surprise, I noticed that my name was rendered as HTML content in the email.
Basic SSTI
It just non-high Impact SSTI to my knowledge.
Sensitive Data Exposure
EXIF Geolocation Data Not Stripped From Uploaded Images
Via localStorage/sessionStorage
After logging out or logging in into the application see any sensitive information on the local storge
Token Leakage via Referer
Try requesting the reset password URL for example in the Browser and after that try to visit the main website while intercepting to see if there's the token is leaked via referer header
Password Reset Token Sent Over HTTP
Check when initiating a Password Reset URL if it sends over HTTP non HTTPs
Sensitive Token in URL
See if there's any sensitive token in the URL such as the session token or something
Pay-Per-Use Abuse
Search for any API Token or Any Sensitive Endpoints and try to making the PoC by making a 200 OK request to these things
Weak Password Reset Implementation
Token is Not Invalidated After Use
In a secure password reset process, the token provided for resetting the password should be invalidated immediately after it is successfully used. This one-time use property ensures that the token cannot be reused by an attacker to repeatedly reset the password and gain unauthorized access to the account.
To fix this issue, the application should be modified to invalidate the password reset token as soon as it is used to reset the password.
Just use this website for testing the targeted domain.
Mail Server Misconfiguration
Email Spoofing - Missing DMARC
Use this website for check the domain is vulnerable?
Use this website for the PoC
Lack of Password Confirmation
Delete Account
As simple it is, Just see if there's any confirmation when deleting your Account
No Rate Limiting on Form
Registration
Login
Email-Triggering
SMS-Triggering
Broken Authentication and Session Management
Failure to Invalidate Session on Logout
Capture a request while authenticated using Burp. Then, log out from the application using the browser. Attempt to resend the request using Burp and observe if it is successful or not.
Failure to Invalidate Session on Reset Password
Cleartext Transmission of Session Token
Observe that the session is send as PlainText without existance of `secure` flag
curl http://example.com/path/to/resource
Registration over HTTP
Login over HTTP
No Password Policy
Just type 1 or 123 for the password and observe that you can register successfully.
2FA Implementation
2FA Secret Remains Obtainable After 2FA is Enabled
In a secure 2FA implementation, the 2FA secret should not be accessible or retrievable after it has been used to set up 2FA. It's usually shown only once during the setup process and should not be available for retrieval or viewing later.
To fix this bug, the application should ensure that the 2FA secret is only shown during the initial setup and is not retrievable afterward. Additionally, the URL where the secret is accessible should be protected to prevent unauthorized access. This helps ensure the security of user accounts that have 2FA enabled.
2FA Secret Cannot be Rotated
In a secure 2FA implementation, users should have the option to change their 2FA secret if they suspect it has been compromised or for periodic security best practices.
To address this issue, the application should implement a feature that allows users to change or rotate their 2FA secret. This feature should be easily accessible within the account settings, and the old secret should be invalidated when a new one is generated to ensure security.
CAPTCHA Bypass
Use this tricks to bypass CAPTCHA
Lack of Security Headers
Missing Secure or HTTPOnly Cookie Flag
Check if the session token is missing the HTTPonly falg and be sure if it is really the session token :)
Cache-Control for a Sensitive Page
Open any sensitive-response page on your browser and capture it request in burp. Observe that there's not cache-control headers in the response or it don't expire.
Try send this request in Burp after closing your browser and observe that you can see the Sensitive Information.
1. Utilize the Bugcrowd email alias to generate emails.
2. Employ Intruder to expedite the process of repeating the requests.
3. Refer to HackTricks notes for bypassing rate limits.