CSPT
Client Side Path Traversal
Detection
Look for file parameters in URLs:
Copy
https://example.com/getFile?path=/user/docs/report.pdf
Check if JavaScript fetches files:
Copy
fetch("/api/getFile?name=report.pdf")
Exploitation
https://app.example.com/delete-session?session=../profile
The resulting DELETE request would target /api/users/profile
instead of /api/users/sessions/${sessionId}
.


CSPT2CSRF
Burp Extension
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated