General Notes
Best approach so far to find Injections:
See filtered special characters with the ffuf -> # To add a wordlist
Testing for basic injections with seclists wordlists (LFI, SQLI)
Testing cookies for injections especially when cookies contains regular data
Testing for SSTI (Java, Python...etc) not only on python apps
API could be vulnerable too!, So try with different request methods as a different method could handle a different functionality on the same endpoint!
How does the application handle other encodings? does it normalize it? (If YES then it's a possible attack vector)
Changing from captial to small or vice-verca is good to try
Don't forget the legacy XPATH Injection
Testing JSON Data
Tampering the JSON structure could trigger an informative error
Some injections such as NOSQL ones require specific payloads
Always pay attention to special characters escaping especially quotes
Authentication
Remove both username and password parameters and see the behavior (Some LDAP backends allow NULL sessions) or Weird PHP comparisions may lead to login bypass.
Payment
Some applications errors if the cart/price is not an integer or a negative number, so try to add multiple items and try to subtract them from each other.
Last updated