Web attacks
Methodology & AcademyOWASP Top 10Avoid Aggressive ScanningWeb EnumerationFuzzingBypass 403 / 401Registration FormEmail Verification BypassEmail injectionsPhone Number InjectionLogin Forms AttacksBypass CaptchaOAuth Misconfiguration2FA / OTPPassword ResetSQL InjectionNoSQL injectionLDAP InjectionXSSSSI Injection, Server Side Include InjectionCSP BypassFile Inclusion LFI / RFIFile Upload AttacksCommand InjectionMarkdown injectionHTTP Verb TamperingHTTP Header ExploitationHTTP Request SmugglingPrice Manipulation MethodsTesting Credit CardsCookies MisconfigurationJWT TokenIDORXXESSTICSTISSRFCSRFCORSOpen RedirectionCSPTRelative Path Overwrite, RPOCRLF InjectionJSON AttackPrototype PollutionWeb Mass AssignmentWeb CacheTabnabbingWAF BypassCMSDjangoFlask / WerkzeugTomcat (8080)Tomcat CGINginxIISExchange / OWAGitLabJenkinsSplunkElasticsearchPRTG Network MonitorosTicketColdFusionNagiosWebminSlackMoodleJira
Was this helpful?