web-security-testing
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseWeb Security Testing Workflow
Web应用安全测试工作流
Overview
概述
Specialized workflow for testing web applications against OWASP Top 10 vulnerabilities including injection attacks, XSS, broken authentication, and access control issues.
针对OWASP Top 10漏洞的专用Web应用测试工作流,包括注入攻击、XSS、身份验证失效以及访问控制问题。
When to Use This Workflow
何时使用此工作流
Use this workflow when:
- Testing web application security
- Performing OWASP Top 10 assessment
- Conducting penetration tests
- Validating security controls
- Bug bounty hunting
在以下场景使用此工作流:
- 测试Web应用安全性
- 执行OWASP Top 10评估
- 开展渗透测试
- 验证安全控制措施
- 漏洞赏金狩猎
Workflow Phases
工作流阶段
Phase 1: Reconnaissance
阶段1:侦察
Skills to Invoke
需调用的技能
- - Security scanning
scanning-tools - - OWASP knowledge
top-web-vulnerabilities
- - 安全扫描
scanning-tools - - OWASP相关知识
top-web-vulnerabilities
Actions
操作步骤
- Map application surface
- Identify technologies
- Discover endpoints
- Find subdomains
- Document findings
- 绘制应用系统范围图
- 识别所用技术栈
- 发现端点
- 查找子域名
- 记录发现结果
Copy-Paste Prompts
可复制粘贴的提示语
Use @scanning-tools to perform web application reconnaissanceUse @scanning-tools to perform web application reconnaissancePhase 2: Injection Testing
阶段2:注入测试
Skills to Invoke
需调用的技能
- - SQL injection
sql-injection-testing - - SQLMap
sqlmap-database-pentesting
- - SQL注入测试
sql-injection-testing - - SQLMap工具
sqlmap-database-pentesting
Actions
操作步骤
- Test SQL injection
- Test NoSQL injection
- Test command injection
- Test LDAP injection
- Document vulnerabilities
- 测试SQL注入
- 测试NoSQL注入
- 测试命令注入
- 测试LDAP注入
- 记录漏洞
Copy-Paste Prompts
可复制粘贴的提示语
Use @sql-injection-testing to test for SQL injectionUse @sqlmap-database-pentesting to automate SQL injection testingUse @sql-injection-testing to test for SQL injectionUse @sqlmap-database-pentesting to automate SQL injection testingPhase 3: XSS Testing
阶段3:XSS测试
Skills to Invoke
需调用的技能
- - XSS testing
xss-html-injection - - HTML injection
html-injection-testing
- - XSS测试
xss-html-injection - - HTML注入测试
html-injection-testing
Actions
操作步骤
- Test reflected XSS
- Test stored XSS
- Test DOM-based XSS
- Test XSS filters
- Document findings
- 测试反射型XSS
- 测试存储型XSS
- 测试基于DOM的XSS
- 测试XSS过滤器
- 记录发现结果
Copy-Paste Prompts
可复制粘贴的提示语
Use @xss-html-injection to test for cross-site scriptingUse @xss-html-injection to test for cross-site scriptingPhase 4: Authentication Testing
阶段4:身份验证测试
Skills to Invoke
需调用的技能
- - Authentication testing
broken-authentication
- - 身份验证测试
broken-authentication
Actions
操作步骤
- Test credential stuffing
- Test brute force protection
- Test session management
- Test password policies
- Test MFA implementation
- 测试凭证填充攻击
- 测试暴力破解防护
- 测试会话管理
- 测试密码策略
- 测试MFA实现
Copy-Paste Prompts
可复制粘贴的提示语
Use @broken-authentication to test authentication securityUse @broken-authentication to test authentication securityPhase 5: Access Control Testing
阶段5:访问控制测试
Skills to Invoke
需调用的技能
- - IDOR testing
idor-testing - - Path traversal
file-path-traversal
- - IDOR测试
idor-testing - - 路径遍历测试
file-path-traversal
Actions
操作步骤
- Test vertical privilege escalation
- Test horizontal privilege escalation
- Test IDOR vulnerabilities
- Test directory traversal
- Test unauthorized access
- 测试垂直权限提升
- 测试水平权限提升
- 测试IDOR漏洞
- 测试目录遍历
- 测试未授权访问
Copy-Paste Prompts
可复制粘贴的提示语
Use @idor-testing to test for insecure direct object referencesUse @file-path-traversal to test for path traversalUse @idor-testing to test for insecure direct object referencesUse @file-path-traversal to test for path traversalPhase 6: Security Headers
阶段6:安全头测试
Skills to Invoke
需调用的技能
- - Security headers
api-security-best-practices
- - 安全头检查
api-security-best-practices
Actions
操作步骤
- Check CSP implementation
- Verify HSTS configuration
- Test X-Frame-Options
- Check X-Content-Type-Options
- Verify referrer policy
- 检查CSP实现
- 验证HSTS配置
- 测试X-Frame-Options
- 检查X-Content-Type-Options
- 验证引用策略
Copy-Paste Prompts
可复制粘贴的提示语
Use @api-security-best-practices to audit security headersUse @api-security-best-practices to audit security headersPhase 7: Reporting
阶段7:报告生成
Skills to Invoke
需调用的技能
- - Security reporting
reporting-standards
- - 安全报告生成
reporting-standards
Actions
操作步骤
- Document vulnerabilities
- Assess risk levels
- Provide remediation
- Create proof of concept
- Generate report
- 记录漏洞
- 评估风险等级
- 提供修复建议
- 制作概念验证
- 生成报告
Copy-Paste Prompts
可复制粘贴的提示语
Use @reporting-standards to create security reportUse @reporting-standards to create security reportOWASP Top 10 Checklist
OWASP Top 10 检查清单
- A01: Broken Access Control
- A02: Cryptographic Failures
- A03: Injection
- A04: Insecure Design
- A05: Security Misconfiguration
- A06: Vulnerable Components
- A07: Authentication Failures
- A08: Software/Data Integrity
- A09: Logging/Monitoring
- A10: SSRF
- A01: 访问控制失效
- A02: 加密机制失败
- A03: 注入攻击
- A04: 不安全设计
- A05: 安全配置错误
- A06: 易受攻击的组件
- A07: 身份验证失败
- A08: 软件/数据完整性问题
- A09: 日志/监控不足
- A10: SSRF
Quality Gates
质量校验项
- All OWASP Top 10 tested
- Vulnerabilities documented
- Proof of concepts captured
- Remediation provided
- Report generated
- 所有OWASP Top 10漏洞已测试
- 漏洞已记录
- 已捕获概念验证
- 已提供修复建议
- 已生成报告
Related Workflow Bundles
相关工作流包
- - Security auditing
security-audit - - API security
api-security-testing - - WordPress security
wordpress-security
- - 安全审计
security-audit - - API安全测试
api-security-testing - - WordPress安全测试
wordpress-security