Notes
Ctrlk
  • 🚀Introduction
  • 🔍Recon & Initial Access
  • 📉Privilege Escalation
  • 🪟Active Directory Penetration Testing
  • 🕸️Web Penetration Testing
    • 🔍Reconnaissance
    • 🔴Attacks
      • HTTP Verb Tampering
      • Login Bruteforcing
      • SQL Injection
      • Cross Site Scripting (XSS)
      • Cross Origin Resource Sharing (CORS)
      • Command Injection
      • File Inclusion
      • File Upload Attacks
      • IDOR
      • XML External Entity Injection (XXE)
      • OAuth Attacks
    • ⚒️Remediations
  • ☁️Cloud Pentesting
  • 🧰Methodology
  • 🛠️Miscellaneous
  • 🛠️CRTO Cheatsheet
Powered by GitBook
On this page
  1. 🕸️Web Penetration Testing

🔴Attacks

HTTP Verb TamperingLogin BruteforcingSQL InjectionCross Site Scripting (XSS)Cross Origin Resource Sharing (CORS)Command InjectionFile InclusionFile Upload AttacksIDORXML External Entity Injection (XXE)OAuth Attacks
PreviousActive ReconNextHTTP Verb Tampering

Last updated 11 months ago