ADIL 🦂 丰 ₿ ⚡ on Nostr: I found an interesting resource that contains information about the main web ...
I found an interesting resource that contains information about the main web vulnerabilities. The peculiarity of this platform is that each of the listed methods can be performed independently, following the tips and examples. And each example is interactive, so it will be easier for you to perceive the material and practice. The content is as follows:
➡ SQL Injection;
➡ Cross-Site Scripting;
➡ Command Execution;
➡ Clickjacking;
➡ Cross-Site Request Forgery;
➡ Directory Traversal;
➡ Reflected XSS;
➡ DOM-based XSS;
➡ File Upload Vulnerabilities;
➡ Broken Access Control;
➡ Open Redirects;
➡ Unencrypted Communication;
➡ User Enumeration;
➡ Information Leakage;
➡ Password Mismanagement;
➡ Privilege Escalation;
➡ Session Fixation;
➡ Weak Session IDs;
➡ XML Bombs;
➡ XML External Entities;
➡ Denial of Service Attacks;
➡ Email Spoofing;
➡ Malvertising;
➡ Lax Security Settings;
➡ Toxic Dependencies;
➡ Logging and Monitoring;
➡ Buffer Overflows;
➡ Server-Side Request Forgery;
➡ Host Header Poisoning;
➡ Insecure Design;
➡ Mass Assignment;
➡ Prototype Pollution;
➡ Regex Injection;
➡ Remote Code Execution;
➡ Cross-Site Script Inclusion;
➡ Downgrade Attacks;
➡ DNS Poisoning;
➡ SSL Stripping;
➡ Subdomain Squatting.
➡️ https://www.hacksplaining.com/lessons
➡ SQL Injection;
➡ Cross-Site Scripting;
➡ Command Execution;
➡ Clickjacking;
➡ Cross-Site Request Forgery;
➡ Directory Traversal;
➡ Reflected XSS;
➡ DOM-based XSS;
➡ File Upload Vulnerabilities;
➡ Broken Access Control;
➡ Open Redirects;
➡ Unencrypted Communication;
➡ User Enumeration;
➡ Information Leakage;
➡ Password Mismanagement;
➡ Privilege Escalation;
➡ Session Fixation;
➡ Weak Session IDs;
➡ XML Bombs;
➡ XML External Entities;
➡ Denial of Service Attacks;
➡ Email Spoofing;
➡ Malvertising;
➡ Lax Security Settings;
➡ Toxic Dependencies;
➡ Logging and Monitoring;
➡ Buffer Overflows;
➡ Server-Side Request Forgery;
➡ Host Header Poisoning;
➡ Insecure Design;
➡ Mass Assignment;
➡ Prototype Pollution;
➡ Regex Injection;
➡ Remote Code Execution;
➡ Cross-Site Script Inclusion;
➡ Downgrade Attacks;
➡ DNS Poisoning;
➡ SSL Stripping;
➡ Subdomain Squatting.
➡️ https://www.hacksplaining.com/lessons