P4n1cThreads
Ctrlk
  • 🏴‍☠️Welcome!
    • Prelude
    • Bookmarks
    • Licence and Disclaimer
  • Stepping Stone
    • The Linux Command Line
    • Network Reconnaissance
    • Main Protocols
    • Shells/TTYs
    • Wordlists
    • Steganography
    • Regex
    • Code
    • OPSEC
    • Databases
  • Web Exploitation
    • Web Reconnaissance
    • Java-based web application
    • GraphQL
    • Python Web Shells
    • Web Services/Frameworks
    • Vulnerabilities
      • PHP Type Juggling
      • Path Traversal
      • XSLT Injection
      • LFI
      • IDOR
      • Email Verification Bypass
      • HTML Injection
      • XSS
      • Clickjacking
      • Command Injection
      • SSRF
      • SQL Injection
      • SSTI
      • SSI
      • XXE
      • Log Poisoning
      • Deserialization
      • SSRF
      • Prototype Pollution
      • Session Hijacking
      • Template Manipulation
      • SQLite Injection
      • NoSQL Injection
      • JavaScript Type Coercion in Validation Logic
  • Cloud Exploitation
    • Kubernetes
    • AWS
  • Linux Exploitation
    • Confirming and Verifying RCE
    • Defense Evasion
    • Static Binaries
    • Enumeration
    • File Transfer
    • Credential Dumping
    • Lateral Movement
    • Persistence
    • Linux Privilege Escalation
    • Docker
    • Seccomp
    • SELinux
  • WINDOWS EXPLOITATION
    • Built-in Applications
    • File Transfer
    • PowerShell Tricks
    • Windows Enumeration
    • Windows Privilege Escalation
  • Wireless Exploitation
    • NFC
  • Android Exploitation
    • Android Debug Bridge
    • Create Malicious Applications
  • Red Team
    • Stealing Browser Data from Chromium on Linux
  • Reverse Engineering
    • C Fundamentals
    • Binaries
  • Cryptanalysis
    • Password Cracking
    • Cryptosystems
    • Investigation Methodology
    • Chinese Remainder Theorem Applications
    • Pollard's Rho
    • RSA Attacks
    • AES-CBC Padding Oracle Attack
  • OSINT
    • User Names
  • DFIR
    • Static File Analysis
    • Security Incident Analysis
  • Tool CheatSheets
    • Curl
    • Nmap
    • tcpdump
    • 🦈Wireshark
    • GDB
    • radare2
    • ffuf
    • feroxbuster
    • Gobuster
    • GoWitness
    • SQLite
    • Metasploit
    • AndroRAT
    • Shodan
    • SQLmap
Powered by GitBook
On this page
Edit
  1. Web Exploitation

Vulnerabilities

PHP Type JugglingPath TraversalXSLT InjectionLFIIDOREmail Verification BypassHTML InjectionXSSClickjackingCommand InjectionSSRFSQL InjectionSSTISSIXXELog PoisoningDeserializationSSRFPrototype PollutionSession HijackingTemplate ManipulationSQLite InjectionNoSQL InjectionJavaScript Type Coercion in Validation Logic
PreviousFlaskNextPHP Type Juggling

Last updated 9 months ago