The Hacker Recipes
CtrlK
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
      • File inclusion
      • Unrestricted file upload
      • SQL injection
      • XSS (Cross-Site Scripting)
      • CSRF (Cross-Site Request Forgery)
      • SSRF (Server-Side Request Forgery)
      • IDOR (Insecure Direct Object Reference)
      • ORED Open redirect
      • Content-Type juggling
      • XXE injection
      • Insecure JSON Web Tokens
      • 🛠️HTTP parameter pollution
      • 🛠️SSTI (Server-Side Template Injection)
      • 🛠️Insecure deserialization
      • 🛠️CRLF injection
      • 🛠️Arbitrary file download
      • 🛠️Directory traversal
      • 🛠️Null-byte injection
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • 🛠️(EDR) Endpoint Detection and Response
  • 🛠️Physical
    • Locks
    • Networking
    • Machines
    • Super secret zones
  • 🛠️Intelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • 🛠️RADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • 🛠️mobile apps
    • Android
    • iOS
Powered by GitBook
On this page

Was this helpful?

  1. Web services

User inputs

File inclusionUnrestricted file uploadSQL injectionXSS (Cross-Site Scripting)CSRF (Cross-Site Request Forgery)SSRF (Server-Side Request Forgery)IDOR (Insecure Direct Object Reference)ORED Open redirectContent-Type jugglingXXE injectionInsecure JSON Web Tokens🛠️HTTP parameter pollution🛠️SSTI (Server-Side Template Injection)🛠️Insecure deserialization🛠️CRLF injection🛠️Arbitrary file download🛠️Directory traversal🛠️Null-byte injection
PreviousLogging inNextFile inclusion

Last updated 3 years ago

Was this helpful?