πŸ“”
Cyber Security Notes
search
⌘Ctrlk
πŸ“”
Cyber Security Notes
  • Introduction
  • CVEs
  • Paper Reviews
  • brain-circuitLarge Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
    • Methodology
    • Footprinting
    • Network Protocols
    • Nifty One Liners
    • Brute-Force Web Pages
    • Network Pentest
    • Web Pentest
      • Web Pentest Interview top topics
      • Wordpress Exploitation
      • Joomla Exploitation
      • Login Bypass using Cookie Tampering/Poisoning
      • Subdomain Enumeration
      • CSRF mitigation
      • XSS mitigation
      • CSP bypass with JSONP
      • PHP Vulnerabilities
      • Python Serialization Vulnerabilities - Pickle
      • SQL Injections
      • SSTI
      • XSS
    • Buffer Overflow Prep
    • Active Directory - Basics
    • DNS/Domain Enum Masterguide
  • Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Enumeration and Initial Compromise

Web Pentest

Contains plugins, services, OWASP Top 10 exploitation and business logic flaws

Web Pentest Interview top topicschevron-rightWordpress Exploitationchevron-rightJoomla Exploitationchevron-rightLogin Bypass using Cookie Tampering/Poisoningchevron-rightSubdomain Enumerationchevron-rightCSRF mitigationchevron-rightXSS mitigationchevron-rightCSP bypass with JSONPchevron-rightPHP Vulnerabilitieschevron-rightPython Serialization Vulnerabilities - Picklechevron-rightSQL Injectionschevron-rightSSTIchevron-rightXSSchevron-right
PreviousMetasploit Quick Referencechevron-leftNextWeb Pentest Interview top topicschevron-right

Last updated 1 year ago