OBJECTIVE 05 — WEB APPLICATION SECURITY TESTING TECHNIQUES
1. WEB APPLICATION SECURITY TESTING — CEH DEFINITION
| Item | Memorize |
| Web Application Security Testing | The process of identifying security weaknesses in a web application by analyzing its functionality, logic, and implementation |
2. SECURITY TESTING GOALS
| Goal |
| Identify vulnerabilities |
| Validate security controls |
| Prevent unauthorized access |
| Protect sensitive data |
3. TYPES OF WEB APPLICATION SECURITY TESTING
| Testing Type | Description |
| Black-box testing | No knowledge of application |
| White-box testing | Full knowledge of source code |
| Gray-box testing | Partial knowledge |
MEMORY HOOK:
Black = Blind, White = All, Gray = Some
Definition
| Item | Memorize |
| Input Validation Testing | Testing how the application handles user-supplied input |
Parameters Tested
| Parameter |
| URL parameters |
| Form fields |
| Cookies |
| HTTP headers |
| JSON/XML payloads |
Common Attacks Identified
| Attack |
| SQL Injection |
| XSS |
| Command Injection |
| LDAP Injection |
Testing Techniques
| Technique |
| Special character injection |
| Boundary value testing |
| Unexpected input |
| Encoding manipulation |
MEMORY HOOK:
Input = attack surface
5. AUTHENTICATION TESTING
Definition
| Item | Memorize |
| Authentication Testing | Testing login and identity verification mechanisms |
Areas Tested
| Area |
| Password strength |
| Login bypass |
| Credential reuse |
| Account lockout |
Common Weaknesses
| Weakness |
| Default credentials |
| Weak passwords |
| No MFA |
| Predictable credentials |
| Tool |
| Burp Suite |
| THC Hydra |
| Medusa |
| Ncrack |
MEMORY HOOK:
Weak auth = takeover
6. SESSION MANAGEMENT TESTING
Definition
| Item | Memorize |
| Session Management Testing | Evaluating how sessions are created, maintained, and terminated |
Session Components
| Component |
| Session ID |
| Cookies |
| Tokens |
Attacks Identified
| Attack |
| Session fixation |
| Session hijacking |
| Cookie theft |
Testing Focus
| Focus |
| Session ID randomness |
| Secure flags |
| Timeout enforcement |
MEMORY HOOK:
Steal session = steal user
7. AUTHORIZATION TESTING
Definition
| Item | Memorize |
| Authorization Testing | Testing access control mechanisms after authentication |
Test Areas
| Area |
| Role-based access |
| Privilege escalation |
| IDOR |
Techniques
| Technique |
| Parameter tampering |
| Forced browsing |
| Role manipulation |
MEMORY HOOK:
AuthN ≠ AuthZ
8. CLIENT-SIDE TESTING
Definition
| Item | Memorize |
| Client-Side Testing | Testing security controls implemented in the browser |
Components Tested
| Component |
| JavaScript |
| HTML |
| Cookies |
| Local storage |
Common Issues
| Issue |
| Client-side validation |
| Hardcoded secrets |
| Exposed logic |
Exam Trap
| Trap | Correct |
| Client-side security is sufficient | NO |
| Server-side validation required | YES |
9. ERROR HANDLING AND LOGGING TESTING
| Focus |
| Verbose error messages |
| Stack traces |
| Debug information |
Impact
| Impact |
| Information disclosure |
| Reconnaissance aid |
10. FILE UPLOAD TESTING
| Test |
| File type validation |
| File size limits |
| Execution permissions |
Attacks
| Attack |
| Web shell upload |
| Malware upload |
11. BUSINESS LOGIC TESTING
| Focus |
| Workflow bypass |
| Transaction tampering |
| Race conditions |
MEMORY HOOK:
Logic flaws bypass security
12. API SECURITY TESTING
| Area |
| Authentication |
| Authorization |
| Rate limiting |
| Input validation |
| Tool |
| Postman |
| Burp Suite |
| OWASP ZAP |
13. AUTOMATED VS MANUAL TESTING
| Type | Characteristics |
| Automated | Fast, scalable |
| Manual | Accurate, contextual |
| Tool | Purpose |
| Burp Suite | Interception and testing |
| OWASP ZAP | Vulnerability scanning |
| Nikto | Web server scanning |
| SQLmap | SQL injection |
| Acunetix | Automated scanning |
FINAL MODULE 14 MEMORY BLOCK (EXAM LOCK)
OBJECTIVES
| # | Topic |
| 1 | Web application concepts |
| 2 | Web application threats |
| 3 | Hacking methodology |
| 4 | APIs and webhooks |
| 5 | Security testing |
CORE MEMORY HOOK
Concept → Threat → Method → API → Test
MODULE 14 STATUS
| Item | Status |
| Pages covered | 100% |
| Concepts skipped | 0 |
| Tools covered | All |
| Commands covered | All expected |
| CEH alignment | Exact |
MODULE 14 COMPLETE
Next available:
-
Module 15 – Hacking Wireless Networks
-
Module 16 – Hacking Mobile Platforms
-
Deep-dive revision tables
-
Exam rapid-fire Q&A
Say which module or revision mode you want next.