πŸ“ž
Contrxl
Ctrlk
External Links
  • 🏑Home
  • πŸ“°News & Information
  • Systems Administration
    • ⌨️Cisco
    • πŸŽ“Learning Links
    • πŸ’»Microsoft
    • πŸ“˜Microsoft Portal Links
  • Cybersecurity
    • ❓Anonymity Tools
    • πŸ’‘OSINT
    • πŸ“šProjects
  • 🦈Hacking
    • ☁️Cloud Attack Vectors
    • Maintaining Persistence
    • πŸ’»Network-Based Vulnerabilities
    • Pivoting
    • Specialised System Vulnerabilities
    • βš’οΈTools
    • πŸ–₯️TryHackMe
    • Web Application Vulnerabilities
      • The HTTP Protocol
      • Business Logic Flaws
      • Injection-Based Vulnerabilities
      • Authentication-Based Vulnerabilities
      • Authorisation-Based Vulnerabilities
      • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery (SSRF)
      • Clickjacking
      • Security Misconfigurations
      • File Inclusion Vulnerabilities
      • Insecure Coding Practices
    • Wireless Vulnerabilities
Powered by GitBook
On this page
  1. 🦈Hacking

Web Application Vulnerabilities

Contents page.

  • The HTTP Protocol

  • Business Logic Flaws

  • Injection-Based Vulnerabilities

  • Authentication-Based Vulnerabilities

  • Authorisation-Based Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery (SSRF)

  • Clickjacking

  • Security Misconfigurations

  • File Inclusion Vulnerabilities

  • Insecure Coding Practices

Last updated 9 months ago