- 1. Welcome
- 2. WEB - OWASP TOP 10
- 2.1. Broken Access Control
- 2.1.1. IDOR
- 2.1.2. Local File Inclusion (LFI)
- 2.1.3. Directory Traversal
- 2.1.4. Authorization Bypass
- 2.2. Cryptographic Failures
- 2.2.1. SSL/TLS Misconfiguration
- 2.2.2. HTTP Strict Transport Security (HSTS)
- 2.3. Injection
- 2.3.1. Stored Cross-Site Scripting (XSS)
- 2.3.2. Reflected Cross-Site Scripting (XSS)
- 2.3.3. DOM-Based Cross-Site Scripting (XSS)
- 2.3.4. SQL Injection (SQLi)
- 2.3.5. Code Injection
- 2.4. Insecure Design
- 2.4.1. CAPTCHA Bypass
- 2.4.2. Lack Of Rate Limiting
- 2.4.3. Sensitive Data Exposure
- 2.4.4. Denial Of Service
- 2.5. Security Misconfiguration
- 2.5.1. XML External Entity (XXE)
- 2.5.2. Default Configurations
- 2.5.3. IIS Tilde Enumeration
- 2.5.4. Verbose Error Messages
- 2.5.5. Stack Traces
- 2.5.6. Server Fingerprinting
- 2.5.7. Cookie Flags
- 2.5.8. HTTP Headers
- 2.6. Vulnerable and Outdated Components
- 2.6.1. Usage Of Vulnerable Components
- 2.7. Identification and Authentication Failures
- 2.7.1. Weak Passwords Policy
- 2.7.2. Lack of Bruteforce Protection
- 2.7.3. Session Fixation
- 2.7.4. Username Enumeration
- 2.8. Software and Data Integrity Failures
- 2.8.1. Data Tampering
- 2.9. Security Logging and Monitoring Failures
- 2.9.1. Insufficient Logging
- 2.10. Server-Side Request Forgery (SSRF)
- 2.10.1. AWS Credentials Theft
- 2.10.2. Internal Network Access