PenBook
Ctrlk
  • /home/~AoneM (Pending Editing)
  • CSC
    • CIA
  • Alignment of the security functions to business (Strategy,Goals, Mission & Objectives)
  • Anatomy Of Security Document Controls
  • Threat Intelligence
    • Unbounded Orchestration
    • Words of Estimative Probability
  • Unbounded Attacks
    • Using Contextual Information to Identify Cyber-Attacks
  • Joint State Estimation Under Attack of Discrete Event Systems
    • Page 1
  • Adversarial Attacks on Neural Networks
    • Page 2
  • Robustness of Network Controllability to Degree-Based Edge Attacks
    • Page 3
  • Deep Learning
    • TensorFlow
    • Sci-Kit Learn
  • Data Science
    • Page 4
  • Image Processing and Computer Vision, OpenCV
    • Page 5
  • System Mathematics
    • Differential equations
  • Page 7
  • System Control
    • Control Theory
  • System Stabilistation
    • Page 9
  • 3D Printing and 3D Scanning
    • Page 10
  • Techical Drawing and GD&T
    • Page 11
  • CAD
    • CATIA
    • SolidWorks
  • Robotics (CATIA)
    • Page 13
  • Advanced MATHLAB
    • Page 14
  • FEA and ANSYS
    • Page 15
  • PLC
    • Page 16
  • Mechatronics
    • Page 17
  • ANATOMY
    • Wireless security model threats And solutions
    • Anatomy Of The Web
    • Anatomy Of The Security in the World of Web Applications
    • Browser Security Features
    • Security Engineering Cheat Sheet.
    • Framework Testing Techniques
  • Comprehensive Defensive Framework
    • Source-Code-Review
    • Access Control (Authorization)
    • Ai Application Security
    • Attack Pattern Architecture: Variants, Chains, and Composites
  • Comprehensive Offensive Framework
    • Algorithmic Biases
    • Data Biases
    • Developer Biases
    • Societal Biases
    • Application Level
    • Automotive Security Misconfiguration
    • Broken Access Control
    • Broken Authentication And Session Management
    • Client Side Injection
    • Insecure Cross Site Reflection
    • CryptoGraphic Weakness
    • External Behavior
    • Indicators Of Compromise
    • Insecure Data Storage
    • Insecure Data Transport
    • Insecure OS Firmware
    • Insufficient Security Configurability
    • Lack Of Binary Hardening
    • Mobile Security Misconfiguration
    • Network Security Misconfiguration
    • Physical Security Issues
    • Privacy Concerns
    • Sensitive Data Exposure
    • Server Security Misconfiguration
      • Bitsquatting
      • Cache Poisoning
      • CAPTCHA
      • Clickjacking
      • Cookie Scoped To Parent Domain
      • dbms Misconfiguration
      • Directory Listing Enabled
      • Exposed Admin Portal
      • Fingerprinting Banner Disclosure
      • Insecure SSL
      • Lack Of Password Confirmation
      • Lack Of Security Headers
      • Mail Server Misconfiguration
      • Misconfigured DNS
      • Missing DNSSEC
      • Missing Secure or HTTPOnly Cookie Flag
      • No Rate Limiting on Form
      • OAuth Misconfiguration
      • Path Traversal
      • Potentially Unsafe HTTP Method Enabled
      • Race Condition
      • Request Smuggling
      • Reflected File Download
      • Same-Site Scripting
      • SSRF
      • SSL Attack BREACH and POODLE
      • Unsafe Cross-Origin Resource Sharing
      • Unsafe File Upload
      • Unsafe Deserialization
      • Username Enumeration
      • WebSockets Enumeration
        • WebSocket Discovery
        • WebSocket FingerPrinting
        • WebSocket Attacks
        • WS-Vulnerability Detection
        • WebSocket to HTTP-Translation
      • Using Default Credentials
      • WAF Bypass
    • Server Side Injection
    • Unvalidated Redirects And Forwards
    • Using Components With Known Vulnerabilities
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attacks
    • Web Technologies
    • Cloud
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windows
  • Mobile
    • General
    • Android
    • iOS
  • 🦀Bug Bounty
    • Pentesting Web checklist
    • Good Report
    • 🆗Code review
    • Master assessment mindmaps
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • Code review
    • Internal Pentest
    • 🆗Web fuzzers review
    • 🆗Recon suites review
    • 🆗Subdomain tools review
    • ⚙️Random
    • Master assessment mindmaps
    • Exploiting
    • tools everywhere
Powered by GitBook
On this page
  1. Comprehensive Offensive Framework
  2. Server Security Misconfiguration

WebSockets Enumeration

WebSocket DiscoveryWebSocket FingerPrintingWebSocket AttacksWS-Vulnerability DetectionWebSocket to HTTP-Translation
PreviousBrute ForceNextWebSocket Discovery

Last updated 1 year ago