1. Welcome
  2. WEB - OWASP TOP 10
    1. Broken Access Control
      1. IDOR
      2. Local File Inclusion (LFI)
      3. Directory Traversal
      4. Authorization Bypass
    2. Cryptographic Failures
      1. SSL/TLS Misconfiguration
      2. HTTP Strict Transport Security (HSTS)
    3. Injection
      1. Stored Cross-Site Scripting (XSS)
      2. Reflected Cross-Site Scripting (XSS)
      3. DOM-Based Cross-Site Scripting (XSS)
      4. SQL Injection (SQLi)
      5. Code Injection
    4. Insecure Design
      1. CAPTCHA Bypass
      2. Lack Of Rate Limiting
      3. Sensitive Data Exposure
      4. Denial Of Service
    5. Security Misconfiguration
      1. XML External Entity (XXE)
      2. Default Configurations
      3. IIS Tilde Enumeration
      4. Verbose Error Messages
      5. Stack Traces
      6. Server Fingerprinting
      7. Cookie Flags
      8. HTTP Headers
    6. Vulnerable and Outdated Components
      1. Usage Of Vulnerable Components
    7. Identification and Authentication Failures
      1. Weak Passwords Policy
      2. Lack of Bruteforce Protection
      3. Session Fixation
      4. Username Enumeration
    8. Software and Data Integrity Failures
      1. Data Tampering
    9. Security Logging and Monitoring Failures
      1. Insufficient Logging
    10. Server-Side Request Forgery (SSRF)
      1. AWS Credentials Theft
      2. Internal Network Access