Web App Testing Flashcards

(13 cards)

1
Q

A parameter file=report.pdf returns files. Changing to ../../../../etc/passwd returns 500. Best next step?

A

Try traversal encodings and validate path handling safely; check error messages and app language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LFI suspected. You can read /etc/passwd. What’s the safest next objective?

A

Confirm controlled file read, then look for log/config files that enable code execution only if allowed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Upload form accepts images only. You can upload .php but it’s renamed. Next step?

A

Test storage location, execution prevention, and whether double extensions/content-type checks can be bypassed safely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Login endpoint returns different error for valid users. What finding is this and what’s next?

A

User enumeration; document and then test auth protections (lockout/MFA) carefully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You see id in a REST API path /api/orders/123. Changing ID returns another user’s order. What is this?

A

IDOR/broken access control; document impact with minimal sensitive data exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A search box shows SQL errors when you enter '. What’s your next step?

A

Determine injection context and test minimally for UNION/error/blind behavior; aim for safe proof.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blind SQLi suspected (no errors). What evidence can you use?

A

Boolean/time-based behavior differences (controlled delays) with minimal requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

App reflects input in HTML. You suspect XSS. What’s safe OSCP proof?

A

Show harmless script execution (e.g., alert) in your own session and document affected parameter/page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A URL fetch feature requests arbitrary URLs. You suspect SSRF. Safest test?

A

Request a harmless internal endpoint/metadata without extracting secrets; document reachable scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You can execute ping via a command injection. What’s next?

A

Try minimal command execution proof and then aim for a stable shell only if allowed and safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Directory traversal lets you read app config that contains DB creds. What should you do?

A

Use creds to authenticate to DB/app as needed and document chain; minimize data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You found a JWT in localStorage with long expiry. What risk and next test?

A

Token theft equals prolonged access; test signature/alg settings only if authorized; recommend rotation/shorter TTL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Web app behind reverse proxy shows X-Forwarded-For handling. What security test matters?

A

Check for auth bypass/IP-trust misconfig (e.g., admin access by spoofed headers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly