mirror of
https://github.com/xalgord/Massive-Web-Application-Penetration-Testing-Bug-Bounty-Notes.git
synced 2024-11-24 19:13:13 +00:00
Update README.md
This commit is contained in:
parent
e0cec30e73
commit
cab261f726
1 changed files with 0 additions and 9 deletions
|
@ -181,12 +181,8 @@ Fingerprint web application frameworks - https://www.youtube.com/watch?v=ASzG0kB
|
||||||
|
|
||||||
A closer look at all owasp top 10 vulnerabilities - https://www.youtube.com/watch?v=avFR_Af0KGk
|
A closer look at all owasp top 10 vulnerabilities - https://www.youtube.com/watch?v=avFR_Af0KGk
|
||||||
|
|
||||||
|
|
||||||
<br><br>
|
|
||||||
### IBM
|
### IBM
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Injection - https://www.youtube.com/watch?v=02mLrFVzIYU&index=1&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
|
Injection - https://www.youtube.com/watch?v=02mLrFVzIYU&index=1&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
|
||||||
|
|
||||||
Broken authentication and session management - https://www.youtube.com/watch?v=iX49fqZ8HGA&index=2&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
|
Broken authentication and session management - https://www.youtube.com/watch?v=iX49fqZ8HGA&index=2&list=PLoyY7ZjHtUUVLs2fy-ctzZDSPpawuQ28d
|
||||||
|
@ -212,7 +208,6 @@ Unvalidated redirects and forwards - https://www.youtube.com/watch?v=L6bYKiLtSL8
|
||||||
### F5 CENTRAL
|
### F5 CENTRAL
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Injection - https://www.youtube.com/watch?v=rWHvp7rUka8&index=1&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
|
Injection - https://www.youtube.com/watch?v=rWHvp7rUka8&index=1&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
|
||||||
|
|
||||||
Broken authentication and session management - https://www.youtube.com/watch?v=mruO75ONWy8&index=2&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
|
Broken authentication and session management - https://www.youtube.com/watch?v=mruO75ONWy8&index=2&list=PLyqga7AXMtPPuibxp1N0TdyDrKwP9H_jD
|
||||||
|
@ -374,8 +369,6 @@ Bypass login panel - case 2 - https://www.youtube.com/watch?v=J6v_W-LFK1c
|
||||||
<br><br>
|
<br><br>
|
||||||
#### Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)
|
#### Phase 9 - Attacking access controls (IDOR, Priv esc, hidden files and directories)
|
||||||
|
|
||||||
|
|
||||||
<br>
|
|
||||||
### Completely unprotected functionalities
|
### Completely unprotected functionalities
|
||||||
|
|
||||||
Finding admin panel - https://www.youtube.com/watch?v=r1k2lgvK3s0
|
Finding admin panel - https://www.youtube.com/watch?v=r1k2lgvK3s0
|
||||||
|
@ -408,8 +401,6 @@ Privilege escalation - case 2 - https://www.youtube.com/watch?v=-i4O_hjc87Y
|
||||||
<br><br>
|
<br><br>
|
||||||
#### Phase 10 – Attacking Input validations (All injections, XSS and mics)
|
#### Phase 10 – Attacking Input validations (All injections, XSS and mics)
|
||||||
|
|
||||||
|
|
||||||
<br>
|
|
||||||
### HTTP verb tampering
|
### HTTP verb tampering
|
||||||
|
|
||||||
Introduction HTTP verb tampering - https://www.youtube.com/watch?v=Wl0PrIeAnhs
|
Introduction HTTP verb tampering - https://www.youtube.com/watch?v=Wl0PrIeAnhs
|
||||||
|
|
Loading…
Reference in a new issue