Sanity check

This is my sanity check I use on CTFs, exams, and pentests. If you see something missing here, don't hesitate to tell me.

Sanity Check

0. Initial Reconnaissance


1. Fuzzing & Discovery


2. Authentication & Session Management

Username Enumeration

Authentication Bypass

Brute Force Protection

Multi-Factor Authentication (MFA)

Token Analysis


3. SQL Injection

Detection

Exploitation

SQLMap


4. Cross-Site Scripting (XSS)

Context Analysis

Filter Bypass

Basic Payloads

Advanced Exploitation

Exfiltrate localStorage token:

Exfiltrate cookies:

CSRF via XSS:

Note: URL-encode entire payload if inserting into a URL parameter


5. Cross-Site Request Forgery (CSRF)


6. Server-Side Request Forgery (SSRF)

Discovery

Exploitation

Cloud Metadata Endpoints

AWS:

GCP:

Azure:


7. File Inclusion

Setup

Local File Inclusion (LFI)

Remote File Inclusion (RFI)

RCE via File Inclusion


8. XML External Entity (XXE)

Discovery

Basic XXE

XInclude Attack

Blind XXE (OOB)

XXE to SSRF


9. Server-Side Template Injection (SSTI)

Detection

Exploitation

Jinja2 (Python):

Twig (PHP):


10. Command Injection

Detection

Blind Command Injection

Bypass Filters


11. Insecure Deserialization

Discovery

Exploitation


12. JWT (JSON Web Tokens)

Analysis


13. Insecure File Upload

Bypass Filters

Exploitation

Access Control


14. Business Logic Flaws


15. Broken Access Control

Horizontal Privilege Escalation

Vertical Privilege Escalation

Method-Based Bypass


16. API Security

REST API Testing

GraphQL

WebSockets


17. Prototype Pollution

Client-Side

Server-Side


18. Cross-Origin Resource Sharing (CORS)


19. HTTP Request Smuggling


20. Cache Poisoning


21. Race Conditions


22. Out-of-Band (OOB) Exploitation

Triggers for OOB

Bypassing localhost restrictions


23. Type Confusion / Type Juggling


24. Client-Side Security

JavaScript Analysis

Subdomain Takeover


25. Security Misconfigurations


Exploitation Payloads

XSS Payloads

Basic:

Advanced - Token Exfiltration:

Cookie Theft:

CSRF via XSS:

SQLMap

JWT Cracking

XXE Payloads

Basic file read:

XInclude:

Blind XXE (OOB):

SSTI Payloads

Detection:

Jinja2 RCE:

Prototype Pollution

URL-based:

JSON-based:

Server-side:

OOB Data Exfiltration

HTML/PDF rendering:

SVG:


Hash Recognition

Hash Type
Length
Character Set
Example

MD5

32 hex chars

[a-f0-9]

5d41402abc4b2a76b9719d911017c592

SHA-1

40 hex chars

[a-f0-9]

aaf4c61ddcc5e8a2dabede0f3b482cd9aea9434d

SHA-256

64 hex chars

[a-f0-9]

2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e...

SHA-512

128 hex chars

[a-f0-9]

9b71d224bd62f3785d96d46ad3ea3d73319bfbc...

bcrypt

60 chars

Starts with $2a$, $2b$, or $2y$

$2a$10$N9qo8uLOickgx2ZMRZoMye...

sha256crypt

Variable

Starts with $5$

$5$rounds=5000$salt$hash...

sha512crypt

Variable

Starts with $6$

$6$rounds=5000$salt$hash...

Quick Identification Tips


Low-Hanging Fruit (Quick Wins)


Last updated