• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 119
  • Last Modified:

does anyone have a pre penetration test Questionnaire?

I'm looking for a list of pre PT Questionnaire, for an application based penetration test.
Thank you in advance,
Danny
0
dannielo
Asked:
dannielo
  • 2
1 Solution
 
btanExec ConsultantCommented:
Go towards OWASP top ten risk will help - look at the "Is the Application Vulnerable?" section in each of the section. That can form your base set of question and the corresponding "answer" is in "How to Prevent" section in each risk chapter. One example,
A1:2017 - Injection Is the Application Vulnerable?

An application is vulnerable to attack when:
• User-supplied data is not validated, filtered, or sanitized by the application.
• Dynamic queries or non-parameterized calls without contextaware escaping are used directly in the interpreter.
• Hostile data is used within object-relational mapping (ORM) search parameters to extract additional, sensitive records.
• Hostile data is directly used or concatenated, such that the SQL or command contains both structure and hostile data in dynamic queries, commands, or stored procedures
https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf
0
 
btanExec ConsultantCommented:
For author advice.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now