Web App Vulnerabilities
Broken Authentication
Broken AuthenticationBroken Links
Browser Attacks
Business logic flaws
Business Logic FlawsBypass Methodology
Clickjacking
ClickjackingCommand Injection
Command InjectionCORS Attacks
Cross Site Leaks
https://xsleaks.dev/ - Huge resource around cross site leak vulnerabilities
CSRF - Cross Site Request Forgery
CSRFCarriage Return and Line Feed Injection
Client Side Template Injection
Client Side Template Injection Scanner - ACSTIS helps you to scan certain web applications for AngularJS Client-Side Template Injection (sometimes referred to as CSTI, sandbox escape or sandbox bypass). It supports scanning a single request but also crawling the entire web application for the AngularJS CSTI vulnerability.
CSV Injection
Dependancy Confusion
Deserialization Attacks
DeserializationDirectory Transversal
Directory traversal (also known as file path traversal) is a web security vulnerability that allows an attacker to read arbitrary files on the server that is running an application. This might include application code and data, credentials for back-end systems, and sensitive operating system files.
File Inclusion Vulnerabilities
File inclusion vulnerabilities allow an attacker to include a file into the applications running code. In order to actually exploit a file inclusion vulnerability, we must be able to not only execute code, but also to write our shell payload somewhere.
Discovered the same way as directory transversals
Locate parameters you can manipulate and attempt to use them to load arbitrary files
We take it one step further and attempt to execute the contents of the file within the application
Local file inclusions (LFI) occur when the included file is loaded from the same web server.
http://10.11.0.22/menu.php?file=c:\xampp\apache\logs\access.log&cmd=ipconfig
Remote file inclusions (RFI) occur when a file is loaded from an external source.
Try changing the local path parameter to a URL.
File Upload
HTML Injection
HTTP Host Header Attacks
HTTP Host Header AttacksHTTP Request Smuggling
HTTP Request SmugglingInput Fuzzing
Insecure Direct Object Reference
Insecure Direct Object ReferenceLDAP Injection
Open Redirect Vulnerabilities
Prototype Pollution
ppfuzz - A fast tool to scan client-side prototype pollution vulnerability written in Rust.
Security Misconfigurations
Security misconfigurations include: • Poorly configured permissions on cloud services, like S3 buckets • Having unnecessary features enabled, like services, pages, accounts or privileges • Default accounts with unchanged passwords • Error messages that are overly detailed and allow an attacker to find out more about the system • Not using HTTP security headers, or revealing too much detail in the Server: HTTP header
Sidejacking
hamster-sidejack - Hamster is tool or “sidejacking”. It acts as a proxy server that replaces your cookies with session cookies stolen from somebody else, allowing you to hijack their sessions.
SQL Injection
SQL InjectionSSRF: Server Side Request Forgery
SSTI: Server Side Template Injection
X-Path Injection
Web Cache Poisoning
Web Cache PoisoningWeb Man-In-The-Middle
Evilginx2 - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
MITM Proxy - Mitmproxy is your swiss-army knife for debugging, testing, privacy measurements, and penetration testing. It can be used to intercept, inspect, modify and replay web traffic such as HTTP/1, HTTP/2, WebSockets, or any other SSL/TLS-protected protocols.
Web Sockets
Web SocketsXXE - XML External Entity Attacks
XXE - XML External Entity AttacksXSS - Cross Site Scripting
XSS Cross-Site ScriptingLast updated
Was this helpful?