👾
PwnBook
search
Ctrlk
  • NETWORK
    • Network Reconnaissance
    • Network Services
  • ACTIVE DIRECTORY
    • Active Directory Methodologychevron-right
  • WEB APPLICATION SECURITY
    • Web Enumeration
    • Web Application Vulnerabilitieschevron-right
      • Command Injection
      • Cross Site Request Forgery (CSRF)
      • Cross Site Scripting (XSS)
      • File Inclusion
      • File Upload
      • Path Traversal
      • SQL Injection
  • Post Exloitation
    • Reverse Shells
    • Sliver C2
    • File Transfer
    • Pivoting
  • PRIVILGE ESCALATION
    • Linux Privilege Escalation
    • Windows Privilege Escalation
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. WEB APPLICATION SECURITY

Web Application Vulnerabilities

Command Injectionchevron-rightCross Site Request Forgery (CSRF)chevron-rightCross Site Scripting (XSS)chevron-rightFile Inclusionchevron-rightFile Uploadchevron-rightPath Traversalchevron-rightSQL Injectionchevron-right