Web Application Penetration Testing

API Hackingchevron-rightAdvanced SQLichevron-rightAuthentication Tokens Bypasschevron-rightBrowser Desyncchevron-rightCMS Attackschevron-rightCommand Injectionchevron-rightCross-Site Request Forgery (CSRF)chevron-rightCross-Site Scripting (XSS)chevron-rightDatabase navigationchevron-rightDirectory Path Traversalchevron-rightExposed Github Repositories Dumpingchevron-rightFastCGIchevron-rightGit Hookschevron-rightGraphQL Pentestingchevron-rightHTTP/2 Request Tunnelingchevron-rightHTTP Attackschevron-rightHTTP Code 403 (Forbidden) Bypasschevron-rightHTTP Misconfigurationschevron-rightHTTP Request Smuggling through Websocketchevron-rightInsecure Deserializationchevron-rightInsecure Direct Object Reference (IDOR)chevron-rightJetty Web Server RCEchevron-rightLDAP Injectionchevron-rightLaTeX Local File Inclusionchevron-rightLocal File Inclusion (LFI)chevron-rightLog Poisoningchevron-rightNoSQL Injectionchevron-rightObject Relational Mapping (ORM) Injectionchevron-rightPDF Generation Vulnerabilitieschevron-rightPHP Assertions RCEchevron-rightPHP Filter Chain LFI to RCEchevron-rightType Jugglingchevron-rightPHP Vulnerabilitieschevron-rightPadding Oracle Attackchevron-rightPrototype Pollutionchevron-rightPython Werkzeug PIN Exploitchevron-rightRemote Code Execution (RCE)chevron-rightRemote File Inclusion (RFI)chevron-rightSQL Injection (SQLi)chevron-rightSSL-TLS Attackschevron-rightSensitive Fileschevron-rightSerialization RCEchevron-rightServer Side Template Injection (SSTI)chevron-rightServer-Side Request Forgery (SSRF)chevron-rightSpringboot Application Pentestingchevron-rightSubdomain Enumerationchevron-rightSymfony Pentestingchevron-rightUpload Vulnerabilitieschevron-rightXML External Entity (XXE) Injectionchevron-rightXPath Injectionchevron-rightTunneling requests via h2c smugglingchevron-rightAuthentication Tokenschevron-rightBypass Techniqueschevron-rightPlaybookschevron-rightScriptschevron-right

Last updated