📞
Contrxl
CtrlK
External Links
  • 🏡Home
  • 📰News & Information
  • Systems Administration
    • ⌨️Cisco
    • 🎓Learning Links
    • 💻Microsoft
    • 📘Microsoft Portal Links
  • Cybersecurity
    • ❓Anonymity Tools
    • 💡OSINT
    • 📚Projects
  • 🦈Hacking
    • ☁️Cloud Attack Vectors
    • Maintaining Persistence
    • 💻Network-Based Vulnerabilities
    • Pivoting
    • Specialised System Vulnerabilities
    • ⚒️Tools
    • 🖥️TryHackMe
    • Web Application Vulnerabilities
      • The HTTP Protocol
      • Business Logic Flaws
      • Injection-Based Vulnerabilities
      • Authentication-Based Vulnerabilities
      • Authorisation-Based Vulnerabilities
      • Cross-Site Scripting (XSS)
      • Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery (SSRF)
      • Clickjacking
      • Security Misconfigurations
      • File Inclusion Vulnerabilities
      • Insecure Coding Practices
    • Wireless Vulnerabilities
Powered by GitBook
On this page
  1. 🦈Hacking

Web Application Vulnerabilities

Contents page.

  • The HTTP Protocol

  • Business Logic Flaws

  • Injection-Based Vulnerabilities

  • Authentication-Based Vulnerabilities

  • Authorisation-Based Vulnerabilities

  • Cross-Site Scripting (XSS)

  • Cross-Site Request Forgery (CSRF/XSRF) and Server-Side Request Forgery (SSRF)

  • Clickjacking

  • Security Misconfigurations

  • File Inclusion Vulnerabilities

  • Insecure Coding Practices

Last updated 7 months ago