Network Security and Vulnerability Exploitation

  1. Web Application Security and Exploitation
    1. Web Application Architecture
      1. Client-Server Model
        1. Multi-tier Architecture
          1. Web Technologies
            1. HTML
              1. CSS
                1. JavaScript
                  1. Server-side Technologies
                  2. Web Application Components
                    1. Web Servers
                      1. Application Servers
                        1. Databases
                          1. Load Balancers
                        2. OWASP Top 10 Vulnerabilities
                          1. Injection Attacks
                            1. SQL Injection
                              1. Error-based SQLi
                                1. Union-based SQLi
                                  1. Boolean-based Blind SQLi
                                    1. Time-based Blind SQLi
                                    2. NoSQL Injection
                                      1. LDAP Injection
                                        1. Command Injection
                                        2. Broken Authentication
                                          1. Session Management Flaws
                                            1. Password Attacks
                                              1. Multi-factor Authentication Bypass
                                              2. Sensitive Data Exposure
                                                1. Encryption Weaknesses
                                                  1. Data Transmission Security
                                                    1. Data Storage Security
                                                    2. XML External Entities
                                                      1. XXE Attack Vectors
                                                        1. Blind XXE
                                                          1. XXE via File Upload
                                                          2. Broken Access Control
                                                            1. Vertical Privilege Escalation
                                                              1. Horizontal Privilege Escalation
                                                                1. Insecure Direct Object References
                                                                2. Security Misconfiguration
                                                                  1. Default Configurations
                                                                    1. Unnecessary Features
                                                                      1. Error Handling
                                                                      2. Cross-Site Scripting
                                                                        1. Reflected XSS
                                                                          1. Stored XSS
                                                                            1. DOM-based XSS
                                                                              1. XSS Filter Bypass
                                                                              2. Insecure Deserialization
                                                                                1. Object Injection
                                                                                  1. Remote Code Execution
                                                                                  2. Using Components with Known Vulnerabilities
                                                                                    1. Dependency Management
                                                                                      1. Version Control
                                                                                      2. Insufficient Logging and Monitoring
                                                                                        1. Log Analysis
                                                                                          1. Incident Detection
                                                                                        2. Advanced Web Application Attacks
                                                                                          1. Cross-Site Request Forgery
                                                                                            1. Server-Side Request Forgery
                                                                                              1. File Inclusion Vulnerabilities
                                                                                                1. Local File Inclusion
                                                                                                  1. Remote File Inclusion
                                                                                                  2. File Upload Vulnerabilities
                                                                                                    1. Business Logic Flaws
                                                                                                      1. Race Conditions
                                                                                                        1. HTTP Parameter Pollution
                                                                                                          1. HTTP Response Splitting