Link Menu Search Expand Document

Pentest Checklists

Things to keep in mind when performing a Pentest.

Table of contents

  1. FTP / SFTP
  2. Web Apps

FTP / SFTP

  • Default credentials
  • Path traversal via file uploads
  • Path traversal via file downloads
  • Path traversal via upload of symbolic links
  • Can users use SSH with the SFTP creds?
  • Can the user create a ~/.ssh/authorized_keys file and gain SSH access to the box?
  • Are there any web application directories available that can be written to?
  • Is there any rate limiting for authentication?
  • Is IP whitelist in place to limit who can connect to the server?
  • Are there directory quotas to avoid DoS by filling up the disk?
  • Is there a limit of connections per user to avoid resource exhaustion? (mostly file descriptors due to too many open sockets)
  • Is it possible to perform user enumeration?
  • Are they using chroot for the FTP/SFTP server?
  • Can you use system accounts to log into the FTP/SFTP server?

Web Apps

  • Check robots.txt
  • Dirbuster

Gilgalab Knowledge Base