🖥️
[Deletion impending]
CtrlK
  • Intro
    • Source disclaimer
  • Misc Security Notes
    • NMAP
    • File Transfer
    • Shells and Command Execution
      • Upgrade Shells
    • Bruteforcing passwords
    • Dumping hashes
      • Hash cracking
    • Pivoting
  • Enum/exploit by port
    • Types of Web Vulnerabilities
      • Server Side Request Forgery
      • SQL Injection
      • Cross Site Scripting
      • Command Injection
      • File Inclusion
      • Broken Authentication
      • Insecure Direct Object Reference
    • 80/443 Web
      • Joomla
      • Pfsense
      • Jenkins
      • Wordpress
      • SQLMap
      • Subdomain enumeration
      • Directory enumeration
    • 88 Kerberoasting
    • 111 RPCbind
    • 135 RPCCLIENT enum (SMB/Samba)
    • 139/445 SMB
    • 389 LDAP
  • Windows
    • Endpoint Basics
      • User and Kernel mode
      • Core Windows processes
      • Sysinternals
    • Logging
      • Event Logs
      • Sysmon
    • Useful CMD commands
    • Useful powershell commands
    • Local Privilege Escalation
    • Credentials on Windows
  • Linux
    • Basic enumeration checklist
    • GTFObins
    • SUID
    • Exploiting writable files and directories
    • Cronjobs / Crontab
  • AD specific tools and methods
    • Active Directory methodology
  • Run outdated python scripts that require equally outdated modules
  • Binary exploitation
    • Assembly
      • Types of memory
      • Registers
      • CISC and RISC
  • Malware analysis
    • Static Analysis
      • Powershell
      • WIN32API
      • Portable Executables
      • Packers
      • String extraction
      • Checksums
      • Office Macros
      • Shellcode
    • Dynamic Analysis
      • Process IOCs Monitoring
      • Network IOCs monitoring
      • x32/x64dbg
      • cutter
  • Forensics
    • Volatility
    • Trashcan
      • (old) (to be deleted or finished )Resolute
Powered by GitBook
On this page

Was this helpful?

  1. Enum/exploit by port

Types of Web Vulnerabilities

Server Side Request ForgerySQL InjectionCross Site ScriptingCommand InjectionFile InclusionBroken AuthenticationInsecure Direct Object Reference
PreviousPivotingNextServer Side Request Forgery

Last updated 2 years ago

Was this helpful?