Back to Shannon

Coverage and Roadmap

COVERAGE.md

latest8.5 KB
Original Source

Coverage and Roadmap

A Web Security Testing (WST) checklist is a comprehensive guide that systematically outlines security tests for web applications, covering areas like information gathering, authentication, session management, input validation, and error handling to identify and mitigate vulnerabilities.

The checklist below highlights the specific WST categories and items that our product consistently and reliably addresses. While Shannon's dynamic detection often extends to other areas, we believe in transparency and have only checked the vulnerabilities we are designed to consistently catch. Our coverage is strategically focused on the WST controls that are applicable to today's Web App technology stacks.

We are actively working to expand this coverage to provide an even more comprehensive security solution for modern web applications.

Current Coverage

Shannon currently targets the following classes of exploitable vulnerabilities:

  • Broken Authentication & Authorization
  • SQL Injection (SQLi)
  • Command Injection
  • Cross-Site Scripting (XSS)
  • Server-Side Request Forgery (SSRF)

What Shannon Does Not Cover

This list is not exhaustive of all potential security risks. Shannon does not, for example, report on issues that it cannot actively exploit, such as the use of vulnerable third-party libraries, weak encryption algorithms, or insecure configurations. These types of static-analysis findings are the focus of our upcoming Keygraph Code Security (SAST) product.

WST Testing Checklist

Test IDTest NameStatus
WSTG-INFOInformation Gathering
WSTG-INFO-01Conduct Search Engine Discovery and Reconnaissance for Information Leakage
WSTG-INFO-02Fingerprint Web Server
WSTG-INFO-03Review Webserver Metafiles for Information Leakage
WSTG-INFO-04Enumerate Applications on Webserver
WSTG-INFO-05Review Webpage Content for Information Leakage
WSTG-INFO-06Identify Application Entry Points
WSTG-INFO-07Map Execution Paths Through Application
WSTG-INFO-08Fingerprint Web Application Framework
WSTG-INFO-09Fingerprint Web Application
WSTG-INFO-10Map Application Architecture
WSTG-CONFConfiguration and Deploy Management Testing
WSTG-CONF-01Test Network Infrastructure Configuration
WSTG-CONF-02Test Application Platform Configuration
WSTG-CONF-03Test File Extensions Handling for Sensitive Information
WSTG-CONF-04Review Old Backup and Unreferenced Files for Sensitive Information
WSTG-CONF-05Enumerate Infrastructure and Application Admin Interfaces
WSTG-CONF-06Test HTTP Methods
WSTG-CONF-07Test HTTP Strict Transport Security
WSTG-CONF-08Test RIA Cross Domain Policy
WSTG-CONF-09Test File Permission
WSTG-CONF-10Test for Subdomain Takeover
WSTG-CONF-11Test Cloud Storage
WSTG-CONF-12Testing for Content Security Policy
WSTG-CONF-13Test Path Confusion
WSTG-CONF-14Test Other HTTP Security Header Misconfigurations
WSTG-IDNTIdentity Management Testing
WSTG-IDNT-01Test Role Definitions
WSTG-IDNT-02Test User Registration Process
WSTG-IDNT-03Test Account Provisioning Process
WSTG-IDNT-04Testing for Account Enumeration and Guessable User Account
WSTG-IDNT-05Testing for Weak or Unenforced Username Policy
WSTG-ATHNAuthentication Testing
WSTG-ATHN-01Testing for Credentials Transported over an Encrypted Channel
WSTG-ATHN-02Testing for Default Credentials
WSTG-ATHN-03Testing for Weak Lock Out Mechanism
WSTG-ATHN-04Testing for Bypassing Authentication Schema
WSTG-ATHN-05Testing for Vulnerable Remember Password
WSTG-ATHN-06Testing for Browser Cache Weakness
WSTG-ATHN-07Testing for Weak Password Policy
WSTG-ATHN-08Testing for Weak Security Question Answer
WSTG-ATHN-09Testing for Weak Password Change or Reset Functionalities
WSTG-ATHN-10Testing for Weaker Authentication in Alternative Channel
WSTG-ATHN-11Testing Multi-Factor Authentication (MFA)
WSTG-ATHZAuthorization Testing
WSTG-ATHZ-01Testing Directory Traversal File Include
WSTG-ATHZ-02Testing for Bypassing Authorization Schema
WSTG-ATHZ-03Testing for Privilege Escalation
WSTG-ATHZ-04Testing for Insecure Direct Object References
WSTG-ATHZ-05Testing for OAuth Weaknesses
WSTG-SESSSession Management Testing
WSTG-SESS-01Testing for Session Management Schema
WSTG-SESS-02Testing for Cookies Attributes
WSTG-SESS-03Testing for Session Fixation
WSTG-SESS-04Testing for Exposed Session Variables
WSTG-SESS-05Testing for Cross Site Request Forgery
WSTG-SESS-06Testing for Logout Functionality
WSTG-SESS-07Testing Session Timeout
WSTG-SESS-08Testing for Session Puzzling
WSTG-SESS-09Testing for Session Hijacking
WSTG-SESS-10Testing JSON Web Tokens
WSTG-SESS-11Testing for Concurrent Sessions
WSTG-INPVInput Validation Testing
WSTG-INPV-01Testing for Reflected Cross Site Scripting
WSTG-INPV-02Testing for Stored Cross Site Scripting
WSTG-INPV-03Testing for HTTP Verb Tampering
WSTG-INPV-04Testing for HTTP Parameter pollution
WSTG-INPV-05Testing for SQL Injection
WSTG-INPV-06Testing for LDAP Injection
WSTG-INPV-07Testing for XML Injection
WSTG-INPV-08Testing for SSI Injection
WSTG-INPV-09Testing for XPath Injection
WSTG-INPV-10Testing for IMAP SMTP Injection
WSTG-INPV-11Testing for Code Injection
WSTG-INPV-12Testing for Command Injection
WSTG-INPV-13Testing for Format String Injection
WSTG-INPV-14Testing for Incubated Vulnerabilities
WSTG-INPV-15Testing for HTTP Splitting Smuggling
WSTG-INPV-16Testing for HTTP Incoming Requests
WSTG-INPV-17Testing for Host Header Injection
WSTG-INPV-18Testing for Server-Side Template Injection
WSTG-INPV-19Testing for Server-Side Request Forgery
WSTG-INPV-20Testing for Mass Assignment
WSTG-ERRHError Handling
WSTG-ERRH-01Testing for Improper Error Handling
WSTG-ERRH-02Testing for Stack Traces
WSTG-CRYPCryptography
WSTG-CRYP-01Testing for Weak Transport Layer Security
WSTG-CRYP-02Testing for Padding Oracle
WSTG-CRYP-03Testing for Sensitive Information Sent Via Unencrypted Channels
WSTG-CRYP-04Testing for Weak Encryption
WSTG-BUSLOGICBusiness Logic Testing
WSTG-BUSL-01Test Business Logic Data Validation
WSTG-BUSL-02Test Ability to Forge Requests
WSTG-BUSL-03Test Integrity Checks
WSTG-BUSL-04Test for Process Timing
WSTG-BUSL-05Test Number of Times a Function Can Be Used Limits
WSTG-BUSL-06Testing for the Circumvention of Work Flows
WSTG-BUSL-07Test Defenses Against Application Misuse
WSTG-BUSL-08Test Upload of Unexpected File Types
WSTG-BUSL-09Test Upload of Malicious Files
WSTG-BUSL-10Test Payment Functionality
WSTG-CLIENTClient-side Testing
WSTG-CLNT-01Testing for DOM Based Cross Site Scripting
WSTG-CLNT-02Testing for JavaScript Execution
WSTG-CLNT-03Testing for HTML Injection
WSTG-CLNT-04Testing for Client-Side URL Redirect
WSTG-CLNT-05Testing for CSS Injection
WSTG-CLNT-06Testing for Client-Side Resource Manipulation
WSTG-CLNT-07Test Cross Origin Resource Sharing
WSTG-CLNT-08Testing for Cross Site Flashing
WSTG-CLNT-09Testing for Clickjacking
WSTG-CLNT-10Testing WebSockets
WSTG-CLNT-11Test Web Messaging
WSTG-CLNT-12Test Browser Storage
WSTG-CLNT-13Testing for Cross Site Script Inclusion
WSTG-CLNT-14Testing for Reverse Tabnabbing
WSTG-APITAPI Testing
WSTG-APIT-01API Reconnaissance
WSTG-APIT-02API Broken Object Level Authorization
WSTG-APIT-99Testing GraphQL