d4Rk's 1337 h4x0r guide
search
⌘Ctrlk
d4Rk's 1337 h4x0r guide
  • Introduction
  • Reconnaissance
    • Recon
    • OSINT
  • Enumeration
    • Network discovery
    • Port scanning
    • Webserver scanning
    • Exploit detection
    • Fuzzing
    • Process monitoring
  • Exploitation
    • Shells
    • Passwords
    • Web
      • SQL injection (SQLi)
      • Cross site scripting (XSS)
      • File inclusions (LFI, RFI)
      • Directory traversal
      • Cross site request forgery (CSRF)
      • XML external entity (XXE)
      • Cross origin resource sharing (CORS)
      • Server-side request forgery (SSRF)
      • Server-side template injection (SSTI)
      • Access control vulnerabilities
      • Authentication vulnerabilities
      • JWT attacks
      • File uploads
      • Host header attacks
      • Clickjacking
      • Logic flaws
      • OS command injection
      • HTTP Request smuggling
      • Insecure deserialization
      • DOM-based
      • WebSockets
      • Web cache poisoning
    • Buffer overflow
    • Misc
  • Privilege escalation
    • Linux
    • Windows
  • Post exploitation
    • Loot
    • Pivoting
    • Standalone Tools
  • Services
    • TCP
    • UDP
    • Misc
  • File transfer
    • Overview
    • Wget
    • Pure-FTPd
    • TFTP
    • VBScript: Wget clone
  • Misc
    • Bash
    • Burp Suite
    • Crypto
    • Ebowla
    • Firefox extensions
    • Impacket
    • Memory forensics
    • Metasploit Framework (MSF)
    • MITM
    • Msfvenom
    • Pass the Hash (PTH)
    • PowerShell
    • PowerShell on Linux
    • Wireshark
    • Wordlists and dictionaries
  • Bug Bounty
    • Platforms
    • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Exploitation

Web

SQL injection (SQLi)chevron-rightCross site scripting (XSS)chevron-rightFile inclusions (LFI, RFI)chevron-rightDirectory traversalchevron-rightCross site request forgery (CSRF)chevron-rightXML external entity (XXE)chevron-rightCross origin resource sharing (CORS)chevron-rightServer-side request forgery (SSRF)chevron-rightServer-side template injection (SSTI)chevron-rightAccess control vulnerabilitieschevron-rightAuthentication vulnerabilitieschevron-rightJWT attackschevron-rightFile uploadschevron-rightHost header attackschevron-rightClickjackingchevron-rightLogic flawschevron-rightOS command injectionchevron-rightHTTP Request smugglingchevron-rightInsecure deserializationchevron-rightDOM-basedchevron-rightWebSocketschevron-rightWeb cache poisoningchevron-right
PreviousPasswords & credentialschevron-leftNextSQL injection (SQLi)chevron-right