- 1. Welcome
- 2. WEB - OWASP TOP 10
- 2.1. Broken Access Control
- 2.1.1. IDOR
- 2.1.2. Local File Inclusion (LFI)
- 2.1.3. Directory Traversal
- 2.1.4. Authorization Bypass
- 2.2. Cryptographic Failures
- 2.2.1. SSL/TLS Misconfiguration
- 2.2.2. HTTP Strict Transport Security (HSTS)
- 2.3. Injection
- 2.3.1. Stored Cross-Site Scripting (XSS)
- 2.3.2. Reflected Cross-Site Scripting (XSS)
- 2.3.3. DOM-Based Cross-Site Scripting (XSS)
- 2.3.4. SQL Injection (SQLi)
- 2.3.5. Code Injection
- 2.4. Insecure Design
- 2.4.1. CAPTCHA Bypass
- 2.4.2. Lack Of Rate Limiting
- 2.4.3. Sensitive Data Exposure
- 2.4.4. Denial Of Service
- 2.5. Security Misconfiguration
- 2.5.1. XML External Entity (XXE)
- 2.5.2. Default Configurations
- 2.5.3. IIS Tilde Enumeration
- 2.5.4. Verbose Error Messages
- 2.5.5. Stack Traces
- 2.5.6. Server Fingerprinting
- 2.5.7. Cookie Flags
- 2.5.8. HTTP Headers
- 2.6. Vulnerable and Outdated Components
- 2.6.1. Usage Of Vulnerable Components
- 2.7. Identification and Authentication Failures
- 2.7.1. Weak Passwords Policy
- 2.7.2. Lack of Bruteforce Protection
- 2.7.3. Session Fixation
- 2.7.4. Username Enumeration
- 2.8. Software and Data Integrity Failures
- 2.8.1. Data Tampering
- 2.9. Security Logging and Monitoring Failures
- 2.9.1. Insufficient Logging
- 2.10. Server-Side Request Forgery (SSRF)
- 2.10.1. AWS Credentials Theft
- 2.10.2. Internal Network Access
- 3. LLM - OWASP TOP 10
- 3.1. LLM01: Prompt Injection
- 3.2. LLM02: Insecure Output Handling
- 3.3. LLM03: Training Data Poisoning
- 3.4. LLM04: Model Denial of Service
- 3.5. LLM05: Supply Chain Vulnerabilities
- 3.6. LLM06: Sensitive Information Disclosure
- 3.7. LLM07: Insecure Plugin Design
- 3.8. LLM08: Excessive Agency
- 3.9. LLM09: Overreliance
- 3.10. LLM10: Model Theft
- 4. MOBILE - OWASP TOP 10
- 4.1. M1: Improper Credential Usage
- 4.1.1. Hardcoded API Keys
- 4.1.2. Tokens Leaked In Logs
- 4.1.3. Credentials In Device Backups
- 4.2. M2: Inadequate Supply Chain Security
- 4.2.1. Trojanized SDKs
- 4.2.2. Dependency Confusion
- 4.2.3. Unsigned Dynamic Code Loading
- 4.3. M3: Insecure Authentication/Authorization
- 4.3.1. Session Token Replay
- 4.3.2. Biometric Bypass
- 4.3.3. Client-Side Only Authorization
- 4.4. M4: Insufficient Input/Output Validation
- 4.4.1. Deep Link Exploitation
- 4.4.2. WebView JavaScript Bridge Injection
- 4.4.3. Content Provider Path Traversal
- 4.5. M5: Insecure Communication
- 4.5.1. TLS Pinning Bypass
- 4.5.2. Cleartext Traffic
- 4.5.3. No Certificate Validation
- 4.6. M6: Inadequate Privacy Controls
- 4.6.1. Unauthorized Location Tracking
- 4.6.2. Clipboard Harvesting
- 4.6.3. Background Sensor Collection
- 4.7. M7: Insufficient Binary Protections
- 4.7.1. Repackaged Malware
- 4.7.2. Debuggable Release Build
- 4.7.3. No Root/Jailbreak Detection
- 4.8. M8: Security Misconfiguration
- 4.8.1. Over-Exported Components
- 4.8.2. Backup Enabled
- 4.8.3. WebView Debugging Enabled
- 4.9. M9: Insecure Data Storage
- 4.9.1. Unencrypted Local Database
- 4.9.2. Secrets In Shared Preferences
- 4.9.3. External Storage Exposure
- 4.10. M10: Insufficient Cryptography
- 4.10.1. Weak Encryption Algorithms
- 4.10.2. Hardcoded Crypto Material
- 4.10.3. IV/Nonce Reuse
- 5. Cloud Vulnerabilities
- 5.1. AWS
- 5.1.1. Public S3 Buckets and Objects
- 5.1.2. IAM Privilege Escalation Paths
- 5.1.3. EC2 Instance Metadata Service (IMDSv1)
- 5.1.4. Open Security Groups
- 5.1.5. CloudTrail Gaps or Tampering
- 5.1.6. S3 Website and Origin Misconfigurations
- 5.1.7. Lambda Over-Privileged Roles and Secrets
- 5.1.8. ECR/ECS Misconfigurations
- 5.1.9. RDS Public Access
- 5.1.10. Cross-Account Trust Abuse
- 5.2. Azure
- 5.2.1. Public Blob Access
- 5.2.2. Managed Identity Abuse
- 5.2.3. AAD App Consent and Role Abuse
- 5.2.4. Key Vault Misconfiguration
- 5.2.5. RBAC Privilege Escalation
- 5.2.6. Function/Kudu Exposure
- 5.2.7. NSG Misconfigurations
- 5.2.8. Logging and Defender Gaps
- 5.3. GCP
- 5.3.1. GCS Public Buckets
- 5.3.2. Service Account Over-Privilege and Keys
- 5.3.3. Metadata Server SSRF and Default Scopes
- 5.3.4. Cloud SQL Public Exposure
- 5.3.5. IAM Misconfig and Lateral Movement
- 5.3.6. Cloud Functions/Run Unauthenticated
- 5.3.7. Audit Logging and Retention Gaps
- 5.3.8. VPC Firewall Open Ingress
- 6. Active Directory Vulnerabilities
- 6.1. Weak Password Policies
- 6.2. Kerberoasting
- 6.3. AS-REP Roasting
- 6.4. Unconstrained Delegation
- 6.5. Constrained Delegation Abuse
- 6.6. Resource-Based Constrained Delegation
- 6.7. AD CS (ESC1) Misconfiguration
- 6.8. DCSync Permissions Abuse
- 6.9. NTLM Relay and Signing Gaps
- 6.10. Privileged Group Sprawl and Tier-0 Bleed
- 6.11. AdminSDHolder and Protected Groups Abuse
- 6.12. Group Policy Preferences (GPP) Passwords in SYSVOL
- 6.13. Insecure Domain and Forest Trusts