📔
Cyber Security Notes
Ctrlk
  • Introduction
  • CVEs
  • Paper Reviews
  • Large Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
    • Methodology
    • Footprinting
    • Network Protocols
    • Nifty One Liners
    • Brute-Force Web Pages
    • Network Pentest
    • Web Pentest
      • Web Pentest Interview top topics
      • Wordpress Exploitation
      • Joomla Exploitation
      • Login Bypass using Cookie Tampering/Poisoning
      • Subdomain Enumeration
      • CSRF mitigation
      • XSS mitigation
      • CSP bypass with JSONP
      • PHP Vulnerabilities
      • Python Serialization Vulnerabilities - Pickle
      • SQL Injections
      • SSTI
      • XSS
    • Buffer Overflow Prep
    • Active Directory - Basics
    • DNS/Domain Enum Masterguide
  • Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
Powered by GitBook
On this page

Was this helpful?

  1. Enumeration and Initial Compromise

Web Pentest

Contains plugins, services, OWASP Top 10 exploitation and business logic flaws

Web Pentest Interview top topicsWordpress ExploitationJoomla ExploitationLogin Bypass using Cookie Tampering/PoisoningSubdomain EnumerationCSRF mitigationXSS mitigationCSP bypass with JSONPPHP VulnerabilitiesPython Serialization Vulnerabilities - PickleSQL InjectionsSSTIXSS
PreviousMetasploit Quick ReferenceNextWeb Pentest Interview top topics

Last updated 12 months ago

Was this helpful?