Cross Site Scripting (XSS)
Cookie Theft Techniques
Session Fixation
Session Hijacking
Token Manipulation
Local Storage Access
Session Storage Exploitation
DOM Content Extraction
Form Data Harvesting
Fake Login Form Creation
Keylogger Implementation
Password Manager Exploitation
Administrative Action Execution
Unauthorized Transactions
Social Engineering Amplification
Browser Exploitation
Plugin Vulnerability Chaining
Local File Access Attempts
Network Reconnaissance
Reputation Damage
Compliance Violations
Financial Losses
Legal Liability
Previous
6. Payload Construction and Techniques
Go to top
Next
8. Vulnerability Discovery Methods