AKUMA
  • README 🥷🏽
  • Red Teaming 👹
    • Loading 50% 😒
  • 👿BLUE TEAM
    • YARA rules
  • 📦Containers
    • DOCKER
      • Docker Security & Pentesting
        • Commond Docker error
      • 8 Best Practices for Docker Host Security
  • Windows Hardening 🛡️
    • Windows Active Directory Pentesting
      • Dll Hijacking
      • MSDT - Microsoft Support Diagnostic Tool Vulnerability
      • AD Enumeration TOOL
      • AD Certificate Templates
      • Kerberos Delegation
    • Windows Security Controls
      • Applocker Basics
    • Powershell Cheat sheet
    • AMSI Bypass
  • Linux Hardening 🛡️
    • Page 1
  • Network Services Pentesting
    • Footprinting Cheat sheet
      • 21-FTP
      • 161-SNMP
      • 445-SMB-139
      • 2049-NFS
      • 53-DNS
      • 587-SMTP
      • 143-IMAP/POP3
    • Juicy Curl
  • Pentesting Web
    • 100 Web Vulnerabilities, categorized into various types
    • Deserialization
      • Node.js Deserialization
    • SHODAN DORK
    • Vulnerabilities PAYLOADS
      • Directory Traversal Payload
      • Html-Injection-Read-FIle
      • Html-Injection
      • OS-Command-Injection
      • SQL-Injection-Auth-Bypass
      • PHP-Code-Injection
      • SQL-Injection
      • SSRF Basic
      • SSRF
      • XML-External-Entity
      • XSLT (eXtensible Stylesheet Language Transformations)
      • XSS Cheat Sheet
        • XSS
        • XSS -
        • XSS-polyglots
        • Cloudflare's XSS protection
    • Base Information
      • File-Extension-Inclusion
        • File-Inclusion-Windows
        • File-Inclusion-Linux
        • File-Extension
      • Media-Type-(MIME)
      • Windows-Sensitive-Files
      • Linux-Sensitive-Files
      • Linux-Log-Files
  • Blogs
    • How I Passed HTB Certified Penetration Testing Specialist
    • A comparative analysis of Open Source Web Application vulnerability scanners (Rana Khalil)
    • Sean Metcalfe Path for AD
    • Secure Docker - HackerSploit
  • Projects
    • HOME LAB
      • HOME LAB Blogs | Active Directory
        • Active Directory Lab Setup - 101
        • Active Directory Lab Setup - 102
        • Active Directory Lab Setup [ AD Enumeration ] - 103
        • Active Directory Lab Setup [AD Attacks ] - 104
      • Home Lab | Splunk Setup & Configuration
    • HOSTING A WEBSITE AND HARDENING ITS SECURITY
  • CTF- Writeups/ Solutions
    • HTB - Advanced Labs
      • Fortress
        • Jet
        • Akerva
        • Context
        • Synacktv
        • Faraday
        • AWS
      • Endgames
        • Ascension
        • RPG
        • Hades
        • Xen
        • P.O.O.
    • idekCTF 2024 🚩
    • TFC CTF 2024 🏳
    • DeadSec CTF 2024 🏴
      • Bing2 (web)
      • Mic_check (misc)
      • Windows Server (OSINT)
    • ImaginaryCTF 2024 🚩
      • cartesian-1 [Forensics]
      • packed [FORENSICS]
      • bom [FORENSICS]
      • BANK [MISC]
    • NahamCon CTF 2024 🏳
      • all WARMUPs
      • Base3200
      • The Hacker Webstore
      • iDoor
      • All About Robots
      • Thomas DEVerson
      • Helpful Desk
      • Curly Fries
    • Cyber Apocalypse 2024: Hacker Royale 🏴
      • Unbreakable [MISC]
      • StopDropAndRoll [MISC]
      • Character [MISC]
      • Delulu [pwn]
      • Tutorial [pwn]
      • Maze [Hardware]
      • TimeKORP [web]
  • Tools
    • Content Discovery & Form Manipulation
      • ffuf
      • RustScan
      • Feroxbuster
      • Dirsearch
      • Gobuster
      • Wfuzz
      • Webshell
      • websocket
Powered by GitBook
On this page
  • MindMap
  • ⚡️ Injection Vulnerabilities:
  • ⚡️ Broken Authentication and Session Management:
  • ⚡️ Sensitive Data Exposure:
  • ⚡️ Security Misconfiguration:
  • ⚡️ XML-Related Vulnerabilities:
  • ⚡️ Broken Access Control:
  • ⚡️ Insecure Deserialization:
  • ⚡️ API Security Issues:
  • ⚡️ Insecure Communication:
  • ⚡️ Client-Side Vulnerabilities:
  • ⚡️ Denial of Service (DoS):
  • ⚡️ Other Web Vulnerabilities:
  • ⚡️ Mobile Web Vulnerabilities:
  • ⚡️ IoT Web Vulnerabilities:
  • ⚡️ Web of Things (WoT) Vulnerabilities:
  • ⚡️ Authentication Bypass:
  • ⚡️ Server-Side Request Forgery (SSRF):
  • ⚡️ Content Spoofing:
  • ⚡️ Business Logic Flaws:
  • ⚡️ Zero-Day Vulnerabilities:
  1. Pentesting Web

100 Web Vulnerabilities, categorized into various types

https://www.mindmeister.com/1470766611/web-app-pentest?fullscreen=1#

MindMap

⚡️ Injection Vulnerabilities:

  1. SQL Injection (SQLi)

  2. Cross-Site Scripting (XSS)

  3. Cross-Site Request Forgery (CSRF)

  4. Remote Code Execution (RCE)

  5. Command Injection

  6. XML Injection

  7. LDAP Injection

  8. XPath Injection

  9. HTML Injection

  10. Server-Side Includes (SSI) Injection

  11. OS Command Injection

  12. Blind SQL Injection

  13. Server-Side Template Injection (SSTI)

⚡️ Broken Authentication and Session Management:

  1. Session Fixation

  2. Brute Force Attack

  3. Session Hijacking

  4. Password Cracking

  5. Weak Password Storage

  6. Insecure Authentication

  7. Cookie Theft

  8. Credential Reuse

⚡️ Sensitive Data Exposure:

  1. Inadequate Encryption

  2. Insecure Direct Object References (IDOR)

  3. Data Leakage

  4. Unencrypted Data Storage

  5. Missing Security Headers

  6. Insecure File Handling

⚡️ Security Misconfiguration:

  1. Default Passwords

  2. Directory Listing

  3. Unprotected API Endpoints

  4. Open Ports and Services

  5. Improper Access Controls

  6. Information Disclosure

  7. Unpatched Software

  8. Misconfigured CORS

  9. HTTP Security Headers Misconfiguration

⚡️ XML-Related Vulnerabilities:

  1. XML External Entity (XXE) Injection

  2. XML Entity Expansion (XEE)

  3. XML Bomb

⚡️ Broken Access Control:

  1. Inadequate Authorization

  2. Privilege Escalation

  3. Insecure Direct Object References

  4. Forceful Browsing

  5. Missing Function-Level Access Control

⚡️ Insecure Deserialization:

  1. Remote Code Execution via Deserialization

  2. Data Tampering

  3. Object Injection

⚡️ API Security Issues:

  1. Insecure API Endpoints

  2. API Key Exposure

  3. Lack of Rate Limiting

  4. Inadequate Input Validation

⚡️ Insecure Communication:

  1. Man-in-the-Middle (MITM) Attack

  2. Insufficient Transport Layer Security

  3. Insecure SSL/TLS Configuration

  4. Insecure Communication Protocols

⚡️ Client-Side Vulnerabilities:

  1. DOM-based XSS

  2. Insecure Cross-Origin Communication

  3. Browser Cache Poisoning

  4. Clickjacking

  5. HTML5 Security Issues

⚡️ Denial of Service (DoS):

  1. Distributed Denial of Service (DDoS)

  2. Application Layer DoS

  3. Resource Exhaustion

  4. Slowloris Attack

  5. XML Denial of Service

⚡️ Other Web Vulnerabilities:

  1. Server-Side Request Forgery (SSRF)

  2. HTTP Parameter Pollution (HPP)

  3. Insecure Redirects and Forwards

  4. File Inclusion Vulnerabilities

  5. Security Header Bypass

  6. Clickjacking

  7. Inadequate Session Timeout

  8. Insufficient Logging and Monitoring

  9. Business Logic Vulnerabilities

  10. API Abuse

⚡️ Mobile Web Vulnerabilities:

  1. Insecure Data Storage on Mobile Devices

  2. Insecure Data Transmission on Mobile Devices

  3. Insecure Mobile API Endpoints

  4. Mobile App Reverse Engineering

⚡️ IoT Web Vulnerabilities:

  1. Insecure IoT Device Management

  2. Weak Authentication on IoT Devices

  3. IoT Device Vulnerabilities

⚡️ Web of Things (WoT) Vulnerabilities:

  1. Unauthorized Access to Smart Homes

  2. IoT Data Privacy Issues

⚡️ Authentication Bypass:

  1. Insecure "Remember Me" Functionality

  2. CAPTCHA Bypass

⚡️ Server-Side Request Forgery (SSRF):

  1. Blind SSR

  2. Time-Based Blind SSRF

⚡️ Content Spoofing:

  1. MIME Sniffing

  2. X-Content-Type-Options Bypass

  3. Content Security Policy (CSP) Bypass

⚡️ Business Logic Flaws:

  1. Inconsistent Validation

  2. Race Conditions

  3. Order Processing Vulnerabilities

  4. Price Manipulation

  5. Account Enumeration

  6. User-Based Flaws

⚡️ Zero-Day Vulnerabilities:

  1. Unknown Vulnerabilities

  2. Unpatched Vulnerabilities

  3. Day-Zero Exploits



PreviousJuicy CurlNextDeserialization

Last updated 9 months ago