Checklist 1 After Recon
Checklist 1 After Recon
(Beginner's Friendly)
Create 2 accounts on the same website if it has login functionality You can
use https://addons.mozilla.org/en-US/firefox/addon/multi-account-
containers/ extension to use same browser for creating different account
on the same website)
Try directory brute forcing using tools like "Dirsearch", " FeroxBuster",
"Ffuf", might be possible some directory may reveal sensitive information
Login Page
Session Expiration
OAuth Bypass It includes features like login with Google, Microsoft,
Instagram or any)
Authentication Bypass
Privilege Escalation
SQLi
Registration Page
XML File Upload using SVG If website asks for Documents upload or Profile
Upload then you can try this)
Bypassing Limitation on File Types to Upload If they just allow jpg,png then
try to upload .php or .py)
Try inserting XSS payload wherever possible Like if you can enter XSS
payload in First Name/Last Name/Address etc text box make sure to enter
Reset Token Leaks This can happen when some website interacts to third
party services at that point of time maybe password reset token is sent via
referrer header part and maybe it can leak)
https://www.youtube.com/watch?v=ds7GHLXi5dM
Check for Older Version of Service is used by your target and if they do try
to find existing exploit for the target.
I have made a video where I shared how older version helped me to find
bug
https://www.youtube.com/watch?v=aJqLoXLr5xo&t=464s