OWASP Top 10
OWASP Top 10 2021 - Complete Penetration Testing Summary
A01: Broken Access Control
What It Is
Key Attack Vectors
Quick Test Methods
# Test parameter manipulation
/user/profile?id=123 → /user/profile?id=456
/admin/dashboard (as regular user)
POST /api/admin/users (check if accessible)
# JWT manipulation
# Decode JWT, change role/user_id, re-encodeCommon Bypass Techniques
A02: Cryptographic Failures
What It Is
Key Areas to Test
Quick Test Methods
Red Flags
A03: Injection
What It Is
Major Injection Types
Quick Test Payloads
Testing Methodology
A04: Insecure Design
What It Is
Design Flaw Categories
Testing Approach
Key Focus Areas
A05: Security Misconfiguration
What It Is
Common Misconfigurations
Quick Security Scan
Automated Detection
A06: Vulnerable and Outdated Components
What It Is
Detection Methods
Common Vulnerable Components
Systematic Approach
A07: Identification and Authentication Failures
What It Is
Key Vulnerability Areas
Testing Checklist
Common Attack Patterns
A08: Software and Data Integrity Failures
What It Is
Key Attack Scenarios
Testing Techniques
Detection Focus
A09: Security Logging and Monitoring Failures
What It Is
What This Means for Pentesters
Testing Approach
Red Flags During Assessment
A10: Server-Side Request Forgery (SSRF)
What It Is
Major Attack Scenarios
Quick Testing Methods
Advanced Bypass Techniques
Testing Methodology Summary
1. Reconnaissance Phase
2. Vulnerability Assessment
3. Exploitation Phase
4. Reporting Phase
Essential Testing Tools
Automated Scanners
Specialized Tools
Manual Testing Extensions
Risk Assessment Matrix
Vulnerability
Exploitability
Prevalence
Impact
Overall Risk
Last updated