- 1. Welcome
- 2. Glossary
- 3. WEB - OWASP TOP 10
- 3.1. Broken Access Control
- 3.1.1. IDOR
- 3.1.2. Local File Inclusion (LFI)
- 3.1.3. Directory Traversal
- 3.1.4. Authorization Bypass
- 3.2. Cryptographic Failures
- 3.2.1. SSL/TLS Misconfiguration
- 3.2.2. HTTP Strict Transport Security (HSTS)
- 3.3. Injection
- 3.3.1. Stored Cross-Site Scripting (XSS)
- 3.3.2. Reflected Cross-Site Scripting (XSS)
- 3.3.3. DOM-Based Cross-Site Scripting (XSS)
- 3.3.4. SQL Injection (SQLi)
- 3.3.5. Code Injection
- 3.4. Insecure Design
- 3.4.1. CAPTCHA Bypass
- 3.4.2. Lack Of Rate Limiting
- 3.4.3. Sensitive Data Exposure
- 3.4.4. Denial Of Service
- 3.5. Security Misconfiguration
- 3.5.1. XML External Entity (XXE)
- 3.5.2. Default Configurations
- 3.5.3. IIS Tilde Enumeration
- 3.5.4. Verbose Error Messages
- 3.5.5. Stack Traces
- 3.5.6. Server Fingerprinting
- 3.5.7. Cookie Flags
- 3.5.8. HTTP Headers
- 3.6. Vulnerable and Outdated Components
- 3.6.1. Usage Of Vulnerable Components
- 3.7. Identification and Authentication Failures
- 3.7.1. Weak Passwords Policy
- 3.7.2. Lack of Bruteforce Protection
- 3.7.3. Session Fixation
- 3.7.4. Username Enumeration
- 3.8. Software and Data Integrity Failures
- 3.8.1. Data Tampering
- 3.9. Security Logging and Monitoring Failures
- 3.9.1. Insufficient Logging
- 3.10. Server-Side Request Forgery (SSRF)
- 3.10.1. AWS Credentials Theft
- 3.10.2. Internal Network Access