Tactics, Techniques, and Procedures
CtrlK
Personal BlogTwitterGitHubContact
  • Tactics, Techniques, and Procedures
  • ☠️Pentesting
    • Fortress
    • Infrastructure
    • Initial Access
    • OSINT
    • Web Applications
      • Access Control
      • APIs
      • Authentication
      • Clickjacking
      • Cross Origin Resource Sharing (CORS)
      • Cross Site Request Forgery (CSRF)
      • Document Object Model (DOM)
      • File Upload
      • Google Dorking
      • GraphQL
      • HTTP Request Smuggling
      • Information Disclosure
      • Insecure Direct Object Reference (IDOR)
      • Injection Vulnerabilities
      • JSON Web Tokens (JWT)
      • Local File Inclusion (LFI)
      • OAuth
      • Open Redirection
      • Password Reset Poisoning
      • Prototype Pollution
      • Race Condition
      • Rate Limit Bypass
      • Remote Code Execution (RCE)
      • Remote File Inclusion (RFI)
      • Suspicious Parameters
      • Tooling
      • WAF Bypasses
      • WebSockets
      • Web Cache Deception
      • Web Cache Poisoning
    • Wireless
    • Cloud
  • 🧨Red Teaming
    • C2
    • Malware Dev
    • Offensive Infrastructure
    • Offensive Tactics
    • Philosophy
  • 🦋Bug Bounty
    • Bug Bounty Tips & Tricks
  • 📖Resources
    • Blog Posts and Goodies
    • Checklists
    • Offensive Security Notes
    • Tooling Repository
    • Active Directory Toolkit
Powered by GitBook
On this page
  1. ☠️Pentesting

Web Applications

Access ControlAPIsAuthenticationClickjackingCross Origin Resource Sharing (CORS)Cross Site Request Forgery (CSRF)Document Object Model (DOM)File UploadGoogle DorkingGraphQLHTTP Request SmugglingInformation DisclosureInsecure Direct Object Reference (IDOR)Injection VulnerabilitiesJSON Web Tokens (JWT)Local File Inclusion (LFI)OAuthOpen RedirectionPassword Reset PoisoningPrototype PollutionRace ConditionRate Limit BypassRemote Code Execution (RCE)Remote File Inclusion (RFI)Suspicious ParametersToolingWAF BypassesWebSocketsWeb Cache DeceptionWeb Cache Poisoning
PreviousSearch EnginesNextAccess Control

Last updated 2 years ago