2021-07-20 17:44:02
Some Web Application Penetration Testing & Bug Bounty Notes
Phase 1 – History
Phase 2 – Web and Server Technology
Phase 3 – Setting Up The Lab With BurpSuite And bWAPP
Phase 4 – Mapping The Application And Attack Surface
Phase 5 – Understanding And Exploiting OWASP Top 10 Vulnerabilities
Phase 6 – Session Management Testing
Phase 7 – Bypassing Client-Side Controls
Phase 8 – Attacking Authentication/Login
Phase 9 – Attacking Access Controls (IDOR, Priv Esc, Hidden Files And Directories)
Phase 10 – Attacking Input Validations (All injections, XSS And Mics)
Phase 11 – Generating And Testing Error Codes
Phase 12 – Weak Cryptography Testing
Phase 13 – Business Logic Vulnerability
Join @HackPsychs For More
Share And Support Us
86 viewsRarely Online For Few Days - Aᴋᴋɪᴇ657 , 14:44