Intrusionz3r0
Ctrlk
Intrusionz3r0-WriteupsHacktheboxGithubLinkedln
  • Welcome
  • Windows Penetration Testing
  • Linux Penetration Testing
  • Malware Development
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • Database Injections
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
      • Bypass 403 - Forbidden
    • Burpsuite through SOCKS5
  • Common Applications
  • Containers Pentesting
  • C2 Command and Control
  • Dark Web
Powered by GitBook
On this page
  1. Hacking Web

Vulnerabilities

Database InjectionsCross Site Scripting (XSS)File path traversal/Local File InclusionFile Upload AttacksCommand InjectionInsecure Direct Object Reference (IDOR)XML External Entity (XXE) InjectionWeb Mass Assignment VulnerabilitiesLog4Shell Exploitation GuideAuthenticationBusiness VulnerabilitiesAccess control vulnerabilitiesServer-Side Request Forgery (SSRF)Cross-site request forgery (CSRF)Cross-origin resource sharing (CORS)ClickjackingDOM-based vulnerabilitiesJWT vulnerabilitiesPassword reset poisoningBypass 403 - Forbidden
PreviousMethodologyNextDatabase Injections

Last updated 10 months ago