๐Ÿ”ฐ Some Web Application Penetration testing & Bug Bounty notes :)


Phase 1 – History

Phase 2 – Web and Server Technology

Phase 3 – Setting up the lab with BurpSuite and bWAPP

Phase 4 – Mapping the application and attack surface

Phase 5 – Understanding and exploiting OWASP top 10 vulnerabilities

Phase 6 – Session management testing

Phase 7 – Bypassing client-side controls

Phase 8 – Attacking authentication/login

Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)

Phase 10 – Attacking Input validations (All injections, XSS and mics)

Phase 11 – Generating and testing error codes

Phase 12 – Weak cryptography testing

Phase 13 – Business logic vulnerability


๐Ÿ”—https://drive.google.com/file/d/1Zd7LH07OD8xLMFx0a44MdOBUTtqTmbov/view?usp=drivesdk


Sสœแด€ส€แด‡ แด€ษดแด… sแดœแด˜แด˜แดส€แด› แดœs

Comments

Popular posts from this blog

MetaMask Warns Apple Users of iCloud Phishing Attacks.

Bitcoin Price Could 10X in Two Years, Peter Brandt Says

๐—•๐—ถ๐—ด๐—ด๐—ฒ๐˜€๐˜ ๐—–๐—ผ๐—น๐—น๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฒ๐—•๐—ผ๐—ผ๐—ธ๐˜€ - ๐Ÿณ๐Ÿฌ๐Ÿฌ ๐—ฒ๐—•๐—ผ๐—ผ๐—ธ๐˜€