d4Rk's 1337 h4x0r guide
Ctrlk
  • Introduction
  • Reconnaissance
    • Recon
    • OSINT
  • Enumeration
    • Network discovery
    • Port scanning
    • Webserver scanning
    • Exploit detection
    • Fuzzing
    • Process monitoring
  • Exploitation
    • Shells
    • Passwords
    • Web
      • SQL injection (SQLi)
      • Cross site scripting (XSS)
      • File inclusions (LFI, RFI)
      • Directory traversal
      • Cross site request forgery (CSRF)
      • XML external entity (XXE)
      • Cross origin resource sharing (CORS)
      • Server-side request forgery (SSRF)
      • Server-side template injection (SSTI)
      • Access control vulnerabilities
      • Authentication vulnerabilities
      • JWT attacks
      • File uploads
      • Host header attacks
      • Clickjacking
      • Logic flaws
      • OS command injection
      • HTTP Request smuggling
      • Insecure deserialization
      • DOM-based
      • WebSockets
      • Web cache poisoning
    • Buffer overflow
    • Misc
  • Privilege escalation
    • Linux
    • Windows
  • Post exploitation
    • Loot
    • Pivoting
    • Standalone Tools
  • Services
    • TCP
    • UDP
    • Misc
  • File transfer
    • Overview
    • Wget
    • Pure-FTPd
    • TFTP
    • VBScript: Wget clone
  • Misc
    • Bash
    • Burp Suite
    • Crypto
    • Ebowla
    • Firefox extensions
    • Impacket
    • Memory forensics
    • Metasploit Framework (MSF)
    • MITM
    • Msfvenom
    • Pass the Hash (PTH)
    • PowerShell
    • PowerShell on Linux
    • Wireshark
    • Wordlists and dictionaries
  • Bug Bounty
    • Platforms
    • Tools
Powered by GitBook
On this page
  1. Exploitation

Web

SQL injection (SQLi)Cross site scripting (XSS)File inclusions (LFI, RFI)Directory traversalCross site request forgery (CSRF)XML external entity (XXE)Cross origin resource sharing (CORS)Server-side request forgery (SSRF)Server-side template injection (SSTI)Access control vulnerabilitiesAuthentication vulnerabilitiesJWT attacksFile uploadsHost header attacksClickjackingLogic flawsOS command injectionHTTP Request smugglingInsecure deserializationDOM-basedWebSocketsWeb cache poisoning
PreviousPasswords & credentialsNextSQL injection (SQLi)