📖
Notes
Search...
Ctrl
K
CyberSecurity
Penetration Testing
TryHackMe
Main Methodology
3. Gaining Access / Exploitation
Web Applications
Previous
Socat
Next
OWASP Top 10
Last updated
1 year ago
OWASP Top 10
File Upload Vulnerabilities
Authentication Vulnerability
XML External Entity (XXE)
Cross-Site Scripting (XSS)
ZTH: Obscure Web Vulns
Server Side Request Forgery (SSRF)
Insecure Direct Object Reference (IDOR)
ZTH : Continued
File Inclusion Vulnerability