Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
Here’s a clear, step-by-step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy-to-follow commands, explanations, and examples where applicable.
🛡️ Information Gathering
WSTG-INFO-01: Conduct Search Engine Discovery Reconnaissance for Information Leakage
Objective: Find sensitive design/configuration information on public-facing search engines.
Explanation: Test account enumeration via brute-force techniques.
🔐 Authentication Testing
WSTG-ATHN-02: Testing for Default Credentials
Objective: Test if default passwords exist.
Commands:
Tools:hydra
Explanation: Test common admin credentials.
WSTG-ATHN-03: Testing for Weak Lock Out Mechanism
Objective: Test account lockout after failed attempts.
Tools:Burp Suite Intruder
Explanation: Simulate brute-force attacks and monitor lockout behavior.
🧾 Session Management Testing
WSTG-SESS-01: Testing for Session Management Schema
Objective: Check session token randomness and security.
Tools:Burp Suite, OWASP ZAP
Explanation: Analyze session cookies and tokens for predictability.
WSTG-SESS-05: Testing for Cross Site Request Forgery (CSRF)
Objective: Check if CSRF protection is enabled.
Tools:Burp Suite
Explanation: Remove CSRF token in intercepted requests and test.
🧠 Business Logic Testing
WSTG-BUSL-01: Test Business Logic Data Validation
Objective: Identify bypassable validation points.
Tools:Burp Suite, Postman
Explanation: Modify payloads manually and observe application behavior.
📦 API Testing
WSTG-APIT-01: API Reconnaissance
Objective: Identify API endpoints and parameters.
Commands:
Tools:gau, httpx
Explanation: Gather URLs and validate them.
WSTG-APIT-99: Testing GraphQL
Objective: Identify GraphQL vulnerabilities.
Commands:
Tools:GraphQLmap
Explanation: Probe for introspection queries.
🚀 Common Tools for All Tests
Recon:nmap, WhatWeb, dirb, gobuster
Scanning:Nikto, OWASP ZAP, Burp Suite
Exploitation:SQLMap, Metasploit
API Testing:Postman, GraphQLmap
Validation:httpx, ffuf
Custom Script 1
Here's a one-of-a-kind Bash script tailored for bug hunters. It automates reconnaissance, scanning, and enumeration tasks from the WSTG list, validates tools, and provides a menu-driven interface to let you choose the specific test you want to run.
🐚 BugHunterPro.sh – The Ultimate Bug Hunting Toolkit
🚀 Key Features:
Interactive Menu: Choose specific WSTG tasks easily.
Target Input Validation: Ensures user provides a valid target.
Tool Auto-Installer: Checks and installs missing tools.
Automation Ready: Executes tailored commands for each task.
Easy Setup: Supports one-time setup.
📜 The Script
Copy this script into a file named BugHunterPro.sh:
🛠️ Setup Instructions
Save the file: nano BugHunterPro.sh
Make it executable:
chmod +x BugHunterPro.sh ```
Run the script:
sudo ./BugHunterPro.sh ```
🚀 Features Overview
Target Validation: Ensures proper input.
Tool Validation: Installs missing tools.
Automation: Executes commands from WSTG efficiently.