The Pentesting Guide
TwitterBlog
  • The Pentesting Guide
  • â„šī¸0 - Pre-Engagement
  • 🔍1 - Information Gathering
  • Passive (OSINT)
  • Active
    • đŸ•ĩī¸HUMINT
    • WIFI
    • IP & Port Scanning
    • Services
      • 21 - FTP
      • 22 - SSH
      • 25 - SMTP
      • 53 - DNS
      • 80,443 - WEB
      • 88 - Kerberos
      • 110 - POP3
      • 111 - rpcbind
      • 161 - SNMP
      • 389 - LDAP
      • 139,445 - SMB
      • Active Directory
  • đŸ’Ŗ2 - Exploitation
  • Brute Forcing
  • WEB
    • Apache Tomcat
    • Authentication
    • Broken Access Control
    • Cache poisoning
    • Clickjacking
    • CORS
    • CSRF
    • File Inclusion
    • Host Header Injection
    • HTTP Request Smuggling
    • Information disclosure
    • JWT
    • OS command injection
    • PHP deserialisation
    • SQLi
    • SSRF
    • SSTI
    • Shellshock
    • Unrestricted File Upload
    • XSS
    • XXE
  • Web (OWASP Test cases)
    • 4.1 Information Gathering
    • 4.2 Configuration and Deployment Management Testing
    • 4.3 Identity Management Testing
    • 4.4 Authentication Testing
    • 4.5 Authorization Testing
    • 4.6 Session Management Testing
    • 4.7 Input Validation Testing
    • 4.8 Testing for Error Handling
    • 4.9 Testing for Weak Cryptography
    • 4.10 Business Logic Testing
    • 4.11 Client-side Testing
    • 4.12 API Testing
  • WIFI
  • HUMINT
    • đŸŽŖGophish (Phishing)
    • Malicious Phishing Files
    • Phishing Evaluation
  • BoF - Windows(x86)
  • Active Directory
    • Kerberos
    • GPOs
    • Certificates
    • LAPS
    • Domain Trusts
  • đŸ‘ŋ3 - Post Exploitation
  • File transfer
  • Shells
  • Situational Awareness
    • Containers and VMs
    • Linux
    • Windows
      • Dumping Credentials
      • Countermeasure Evasion
    • Active Directory
      • BloodHound & SharpHound
  • General
    • Linux
    • Windows
  • Local Privilege Escalation
    • Linux
    • Windows
  • Persistance
    • Windows
  • Cracking
  • Pivoting
    • Tunnelling & Port Forwarding
  • Lateral Movement
  • WIFI
  • 📓4 - Report
  • 🧹5 - House cleaning
Powered by GitBook
On this page
  • Identity Management Testing
  • 4.3.1 Test Role Definitions
  • 4.3.2 Test User Registration Process
  • 4.3.3 Test Account Provisioning Process
  • 4.3.4 Testing for Account Enumeration and Guessable User Account
  • 4.3.5 Testing for Weak or Unenforced Username Policy
  1. Web (OWASP Test cases)

4.3 Identity Management Testing

Last updated 5 months ago

4.3.1

Evidence:

​

4.3.2

Verify that the identity requirements for user registration are aligned with business and security requirements.

Validate the registration process.

Evidence:

​

Determine which roles are able to provision users and what sort of accounts they can provision.

Evidence:

​

Review processes that pertain to user identification looking for ways to enumerate accounts.

To obtain a wordlist of existing and not existing emails, you can execute the following command

cat registered_emails.txt | awk -F "@" '{print $1"@"$2"\n"$1"donotexist@"$2}' | xclip -sel clipboard

Evidence:

​

Evidence:

​

4.3.3

4.3.4

4.3.5

Check if there is any kind of account name structure like “” or “” that could lead to user name enumeration.

Identity Management Testing
Test Role Definitions
Test User Registration Process
Test Account Provisioning Process
Testing for Account Enumeration and Guessable User Account
Testing for Weak or Unenforced Username Policy
John.deer@email.com
jdeer@email.com