PenBook
Ctrlk
  • /home/~AoneM (Pending Editing)
  • CSC
    • CIA
  • Alignment of the security functions to business (Strategy,Goals, Mission & Objectives)
  • Anatomy Of Security Document Controls
  • Threat Intelligence
    • Unbounded Orchestration
    • Words of Estimative Probability
  • Unbounded Attacks
    • Using Contextual Information to Identify Cyber-Attacks
  • Joint State Estimation Under Attack of Discrete Event Systems
    • Page 1
  • Adversarial Attacks on Neural Networks
    • Page 2
  • Robustness of Network Controllability to Degree-Based Edge Attacks
    • Page 3
  • Deep Learning
    • TensorFlow
    • Sci-Kit Learn
  • Data Science
    • Page 4
  • Image Processing and Computer Vision, OpenCV
    • Page 5
  • System Mathematics
    • Differential equations
  • Page 7
  • System Control
    • Control Theory
  • System Stabilistation
    • Page 9
  • 3D Printing and 3D Scanning
    • Page 10
  • Techical Drawing and GD&T
    • Page 11
  • CAD
    • CATIA
    • SolidWorks
  • Robotics (CATIA)
    • Page 13
  • Advanced MATHLAB
    • Page 14
  • FEA and ANSYS
    • Page 15
  • PLC
    • Page 16
  • Mechatronics
    • Page 17
  • ANATOMY
    • Wireless security model threats And solutions
    • Anatomy Of The Web
    • Anatomy Of The Security in the World of Web Applications
    • Browser Security Features
    • Security Engineering Cheat Sheet.
    • Framework Testing Techniques
  • Comprehensive Defensive Framework
    • Source-Code-Review
    • Access Control (Authorization)
    • Ai Application Security
    • Attack Pattern Architecture: Variants, Chains, and Composites
  • Comprehensive Offensive Framework
    • Algorithmic Biases
    • Data Biases
    • Developer Biases
    • Societal Biases
    • Application Level
    • Automotive Security Misconfiguration
    • Broken Access Control
    • Broken Authentication And Session Management
    • Client Side Injection
    • Insecure Cross Site Reflection
    • CryptoGraphic Weakness
    • External Behavior
    • Indicators Of Compromise
    • Insecure Data Storage
    • Insecure Data Transport
    • Insecure OS Firmware
    • Insufficient Security Configurability
    • Lack Of Binary Hardening
    • Mobile Security Misconfiguration
    • Network Security Misconfiguration
    • Physical Security Issues
    • Privacy Concerns
    • Sensitive Data Exposure
    • Server Security Misconfiguration
    • Server Side Injection
      • Content Spoofing
      • Unicode Normalization
      • File Inclusion
      • HTTP Response Manipulation
      • LDAP Injection
      • Parameter Pollution
      • Remote Code Execution (RCE)
      • SQL Injection
      • SSTI
      • XML External Entity Injection
      • XPath Injection
      • XSLT Server Side Injection
    • Unvalidated Redirects And Forwards
    • Using Components With Known Vulnerabilities
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attacks
    • Web Technologies
    • Cloud
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windows
  • Mobile
    • General
    • Android
    • iOS
  • 🦀Bug Bounty
    • Pentesting Web checklist
    • Good Report
    • 🆗Code review
    • Master assessment mindmaps
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • Code review
    • Internal Pentest
    • 🆗Web fuzzers review
    • 🆗Recon suites review
    • 🆗Subdomain tools review
    • ⚙️Random
    • Master assessment mindmaps
    • Exploiting
    • tools everywhere
Powered by GitBook
On this page
  1. Comprehensive Offensive Framework

Server Side Injection

Content SpoofingUnicode NormalizationFile InclusionHTTP Response ManipulationLDAP InjectionParameter PollutionRemote Code Execution (RCE)SQL InjectionSSTIXML External Entity InjectionXPath InjectionXSLT Server Side Injection
PreviousDirect Server AccessNextContent Spoofing

Last updated 1 year ago