Hacking Notes Jordan
search
⌘Ctrlk
Socialchevron-downCTF Platformschevron-downPortfolio
Hacking Notes Jordan
  • skull-crossbonesHome
  • ENUMERATION
    • eyeAdvanced Network Scanning with Nmap
    • rotate-rightDirectory and File Fuzzing: Advanced Security Techniques
    • arrow-rotate-leftSubdomain Enumeration: Advanced Fuzzing Methods
    • webflowWeb Technology Profiling and Enumeration
    • googleAdvanced Google Dorking for Security Insights
    • crosshairs-simpleOSINT Strategies
  • globeWeb Hacking - PortSwigger
    • SQL Injection (SQLI)
    • Cross-site Scripting (XSS)
    • Cross-site Request Forgery (CSRF)
    • Clickjacking
    • DOM-based vulnerabilities
    • Cross-origin resource sharing (CORS)
    • XML external entity (XXE) injection
    • Server-side request forgery (SSRF)
    • HTTP request smuggling
    • OS command injection
    • Server-side template injection (SSTI)
    • Path Traversal
    • Access control vulnerabilities
    • Authentication
    • WebSockets
    • Web Cache Poisoning
    • Insecure deserialization
    • Information disclosure
    • Business logic vulnerabilities
    • HTTP Host header attacks
    • OAuth authentication
    • File upload vulnerabilities
    • JWT (Json Web Tokens)
    • Essential skills
    • Prototype Pollution
    • GraphQL API vulnerabilities
    • Race conditions
    • NoSQL injection
    • API testing
    • Web LLM attacks
    • Web cache deception
    • seal-exclamationBSCP Certification - guide pratique
    • questionPortswigger Helparrow-up-right
    • questionPortswigger Help 2arrow-up-right
    • square-checkWRITEUP : PRACTICE EXAM 1 (BSCP)
    • square-checkWRITEUP : PRACTICE EXAM 2 (BSCP)
  • PRIVILEGE ESCALATION (Linux)
    • linuxSudoers - Escalation Techniques
    • linuxSUID - Escalation Techniques
    • linuxCron Jobs - Escalation Techniques
    • linuxVulnerability DirtyPipe [CVE-2022-0847]
    • linuxLinux Permissions Management - Escalation Techniques
    • linuxCapabilities - Escalation Techniques
    • linuxPATH Hijacking - Escalation Techniques
    • linuxLinux Kernel Exploitation
    • linuxPython Library Hijacking - Escalation Techniques
    • linuxUser Groups Linux - Escalation Techniques
    • linuxDocker Escape - Escalation Techniques
    • linuxShared Library Hijacking - Escalation Techniques
    • linuxTools - Linux Privilege Escalation
  • OWASP TOP 10 VULNERABILITIES
    • syringeVulnerability SQL Injection (SQLI)
    • octagon-exclamationVulnerability Cross-Site Scripting (XSS)
    • file-xmlVulnerability XML External Entity Injection (XXE)
    • file-exportVulnerability Local File Inclusion (LFI)
    • arrow-right-from-bracketVulnerability Local File Inclusion to Remote Code Execution (LFI to RCE)
    • gamepad-modernVulnerability Remote File Inclusion (RFI)
    • masks-theaterVulnerability Cross-Site Request Forgery (CSRF)
    • serverVulnerability Server-Side Request Forgery (SSRF)
    • brackets-curlyVulnerability Server-Side Template Injection (SSTI)
    • brackets-squareVulnerability Client-Side Template Injection (CSTI)
  • WEB VULNERABILITIES
    • arrow-up-from-bracketFile Upload Attack
    • monumentPadding Oracle Attack
    • sparklesType Juggling Attack
    • databaseNoSQL Attack
    • laptop-arrow-downLightweight Directory Access Protocol (LDAP) Attack
    • binary-lockDeserialization Attack
    • bookLatex Injection Attack
    • webhookAPI Attack
    • smogPrototype Pollution Attack
    • earth-africaAXFR - Full Zone Transfer Attack
    • head-side-gearMass-Assignment Attack
    • square-rightOpen Redirect Attack
    • web-awesomewebDAV Attack
    • squidProxys Squid Attack
    • user-alienShellShock Attack
    • bezier-curveXPath Injection Attack
    • slidersInsecure Direct Object Reference (IDOR) Attack
    • square-caret-leftCross-Origin Resource Sharing (CORS) Attack
    • knife-kitchenSQL Truncation Attack
    • lassoExecution After Redirect (EAR) Attack
    • puzzle-pieceSession Puzzling Attack
    • fan-tableRace Condition Attack
    • hockey-maskJSON Web Token (JWT) Attack
    • css3-altCSS Injection (CSSI)
    • yammerDeserialization Yaml Attack
    • tombstone-blankHTTP Header Command Injection
    • cucumberDeserialization Pickle Attack
    • chart-bulletGraphQL Attack
  • Windows Vulnerabilities
    • windowsSMB Relay Exploitation - Brouillon
    • windowsWindows Vulnerabilities
    • windowswhoami /priv Windows Exploitation
    • windowswhoami /groups Windows Exploitation
    • windowsVulnerable Processes Windows
    • windowsKernel Exploitation - Windows
    • windowsBinary Analysis Windows
    • windowsTools - Windows
  • WRITEUPS (CTF)
    • cubeHackTheBox
    • frameVulnHub
    • circle-boltPortSwigger
  • Ports & Services
    • folderPort 21 - Pentesting FTP
    • circle-nodesPort 22 - Pentesting SSH
    • lockPorts 80/443 - Pentesting HTTP & HTTPS
    • bowl-scoopPort 88 - Pentesting Kerberos
    • file-linesPort 161 - Pentesting SNMP
    • medappsPorts 389/636/3268/3269 - Pentesting LDAP
    • printPort 445 - Pentesting SMB
    • centosPort 1337 - Pentesting gdbserver
    • microsoftPort 1433 - Pentesting MSSQL (Microsoft SQL)
    • servicestackPort 2049 - Pentesting NFS Service
    • objects-align-bottomPort 3632 - Pentesting distcc
    • laptop-arrow-downPort 3389 - Pentesting RDP
    • square-envelopePorts 4555/119/110 - Pentesting James Server
    • wand-magicPorts 5800,5801,5900,5901 - VNC
    • expeditedsslPort 5986 - Pentesting WinRM
    • hat-beachPort 7096 - Pentesting HardHatC2
    • infoPort 8086 - Pentesting InfluxDB
    • brackets-curlyPort 8443 - Pentesting Devzat
    • game-console-handheldPort 8500 - Pentesting Consul UI
    • galactic-senatePort 9200 - Pentesting Elasticsearch
    • databasePort 27017 - MongoDB Pentesting
    • avocadoPort 40056 Pentesting Havoc-C2
    • gearHacking Tools
    • globeCMS Exploitation
    • bufferBuffer OverFlow
    • doveProfessional Reports (LaTeX)
  • Others
    • rotate-reverseReverse Shell - Techniques
    • arrow-turn-rightPort Forwarding Techniques
    • arrow-down-up-across-lineFile Transfer
    • hand-fistBrute Force Attacks
    • unlockBoot Linux without password
    • rectangle-terminalLinux Upgrading Non-Interactive Shells
    • barcode-readNetwork Manual Scan
    • image-slashSteganography - Steghide
    • window-maximizeView History on PowerShell
    • face-dottedAlternate Data Streams (ADS)
    • key-skeletonKeePass Memory Dump (.mdp)
    • face-hushedDepix Images
    • firefox-browserExtracting Credentials from Firefox Profile
    • square-terminalConvert PuTTY key to OpenSSH
    • square-xmarkEscaping RBash to Normal Bash - Linux
    • pythonEscaping Python to Normal Bash - Linux
    • rabbitPivoting
    • seal-exclamationeJPT Certification - guide pratique
  • HACKING WIFI
    • routerWPA /WPA2 (PSK)
gitbookPropulsé par GitBook
block-quoteSur cette pagechevron-down
  1. globeWeb Hacking - PortSwigger

globeWeb Hacking - PortSwigger

LogoAll labs | Web Security AcademyWebSecAcademychevron-right
SQL Injection (SQLI)
Cross-site Scripting (XSS)
Cross-site Request Forgery (CSRF)
Clickjacking
DOM-based vulnerabilities
Cross-origin resource sharing (CORS)
XML external entity (XXE) injection
Server-side request forgery (SSRF)
HTTP request smuggling
OS command injection
Server-side template injection (SSTI)
Path Traversal
Access control vulnerabilities
Authentication
WebSockets
Web Cache Poisoning
Insecure deserialization
Information disclosure
Business logic vulnerabilities
HTTP Host header attacks
OAuth authentication
File upload vulnerabilities
JWT (Json Web Tokens)
Essential skills
Prototype Pollution
GraphQL API vulnerabilities
Race conditions
NoSQL injection
API testing
Web LLM attacks
Web cache deception

Mis à jour il y a 1 mois

linkedin