VAPT web application checklist

Pre-Assessment Planning

Information Gathering

  • Review the application's documentation.
  • Analyze HTTP headers for technology stack.
  • Investigate code repositories (e.g., GitHub).
  • Use online services to identify frameworks and libraries.
  • Map out the application architecture visually.
  • Explore all accessible URLs and endpoints.
  • List different user roles and permissions.
  • Document input fields and forms for each entry point.
  • Identify authentication and session management mechanisms.
  • Note any APIs and their expected data formats.
  • Research the organization's domain and subdomains.
  • Gather information from social media and forums.
  • Look for leaked credentials or sensitive data online.
  • Identify key personnel and their roles.
  • Use WHOIS lookup for domain registration details.
  • Employ tools like Nmap for network scanning.
  • Use Burp Suite for application analysis.
  • Utilize Google Dorking for information retrieval.
  • Incorporate Shodan to discover exposed services.
  • Leverage reconnaissance tools like Maltego for data mining.

Vulnerability Assessment

Penetration Testing

Post-Testing Analysis

Remediation and Re-Testing

Final Reporting and Documentation

Continuous Monitoring and Improvement

Related Checklists