Pentest Checklists
Things to keep in mind when performing a Pentest.
Table of contents
FTP / SFTP
- Default credentials
- Path traversal via file uploads
- Path traversal via file downloads
- Path traversal via upload of symbolic links
- Can users use SSH with the SFTP creds?
- Can the user create a ~/.ssh/authorized_keys file and gain SSH access to the box?
- Are there any web application directories available that can be written to?
- Is there any rate limiting for authentication?
- Is IP whitelist in place to limit who can connect to the server?
- Are there directory quotas to avoid DoS by filling up the disk?
- Is there a limit of connections per user to avoid resource exhaustion? (mostly file descriptors due to too many open sockets)
- Is it possible to perform user enumeration?
- Are they using chroot for the FTP/SFTP server?
- Can you use system accounts to log into the FTP/SFTP server?
Web Apps
- Check robots.txt
- Dirbuster