Tactics, Techniques, and Procedures
search
⌘Ctrlk
Personal BlogTwitterGitHubContact
Tactics, Techniques, and Procedures
  • Tactics, Techniques, and Procedures
  • ☠️Pentesting
    • Fortress
    • Infrastructure
    • Initial Access
    • OSINT
    • Web Applications
      • Access Control
      • APIs
      • Authentication
      • Clickjacking
      • Cross Origin Resource Sharing (CORS)
      • Cross Site Request Forgery (CSRF)
      • Document Object Model (DOM)
      • File Upload
      • Google Dorking
      • GraphQL
      • HTTP Request Smuggling
      • Information Disclosure
      • Insecure Direct Object Reference (IDOR)
      • Injection Vulnerabilities
      • JSON Web Tokens (JWT)
      • Local File Inclusion (LFI)
      • OAuth
      • Open Redirection
      • Password Reset Poisoning
      • Prototype Pollution
      • Race Condition
      • Rate Limit Bypass
      • Remote Code Execution (RCE)
      • Remote File Inclusion (RFI)
      • Suspicious Parameters
      • Tooling
      • WAF Bypasses
      • WebSockets
      • Web Cache Deception
      • Web Cache Poisoning
    • Wireless
    • Cloud
  • 🧨Red Teaming
    • C2
    • Malware Dev
    • Offensive Infrastructure
    • Offensive Tactics
    • Philosophy
  • 🦋Bug Bounty
    • Bug Bounty Tips & Tricks
  • 📖Resources
    • Blog Posts and Goodies
    • Checklists
    • Offensive Security Notes
    • Tooling Repository
    • Active Directory Toolkit
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ☠️Pentesting

Web Applications

Access Controlchevron-rightAPIschevron-rightAuthenticationchevron-rightClickjackingchevron-rightCross Origin Resource Sharing (CORS)chevron-rightCross Site Request Forgery (CSRF)chevron-rightDocument Object Model (DOM)chevron-rightFile Uploadchevron-rightGoogle Dorkingchevron-rightGraphQLchevron-rightHTTP Request Smugglingchevron-rightInformation Disclosurechevron-rightInsecure Direct Object Reference (IDOR)chevron-rightInjection Vulnerabilitieschevron-rightJSON Web Tokens (JWT)chevron-rightLocal File Inclusion (LFI)chevron-rightOAuthchevron-rightOpen Redirectionchevron-rightPassword Reset Poisoningchevron-rightPrototype Pollutionchevron-rightRace Conditionchevron-rightRate Limit Bypasschevron-rightRemote Code Execution (RCE)chevron-rightRemote File Inclusion (RFI)chevron-rightSuspicious Parameterschevron-rightToolingchevron-rightWAF Bypasseschevron-rightWebSocketschevron-rightWeb Cache Deceptionchevron-rightWeb Cache Poisoningchevron-right
PreviousSearch Engineschevron-leftNextAccess Controlchevron-right

Last updated 2 years ago