Web attacks
Methodology & AcademyOWASP Top 10Avoid Aggressive ScanningWeb EnumerationFuzzingBypass 403 / 401Registration FormEmail Verification BypassEmail injectionsPhone Number InjectionLogin Forms AttacksBypass CaptchaOAuth Misconfiguration2FA / OTPBypass 302Password ResetSQL InjectionNoSQL injectionLDAP InjectionXSSSSI / ESI InjectionCSP BypassFile Inclusion LFI / RFIFile Upload AttacksCommand InjectionMarkdown injectionXPath InjectionHTTP Verb TamperingHTTP Header ExploitationHTTP Request SmugglingPrice / Checkout Manipulation MethodsTesting Credit CardsCookies MisconfigurationBasic HTTP AuthentificationJWT TokenIDORXXE / XSLTSSTICSTISSRFCSRFCORSOpen RedirectionCSPTRelative Path Overwrite, RPOCRLF InjectionJSON AttackPrototype PollutionWeb Mass AssignmentWeb CacheClickjackingTabnabbingRace ConditonsWAF BypassCMSDjangoFlask / WerkzeugTomcat (8080)Tomcat CGINginxIISExchange / OWAGitLabJenkinsSplunkElasticsearchPRTG Network MonitorosTicketColdFusionNagiosWebminSlackMoodleJiraMagentoPrestashopDocker
Was this helpful?