Collection of resources to learn and practice WebApp attacks.
- https://www.pluralsight.com/courses/ethical-hacking-sql-injection
- https://sqlwiki.netspi.com/detection#mysql
- http://securityidiots.com/Web-Pentest/SQL-Injection
- https://websec.ca/kb/sql_injection
- https://osandamalith.com/tag/mysql/page/1/
- Web security
- web for pentester
- web for pentester II
- sqli to shell
- sqli to shell II
- sqli to shell pg
- cve-2012-2661
- xss and mysql
- Sqli-labs
- sql ninja labs
- Omega CTF Solution
- https://www.google.com/about/appsecurity/learning/xss/#BasicExample
- http://brutelogic.com.br/blog/
- https://github.com/s0md3v/AwesomeXSS
- https://excess-xss.com/
- Part 1
- Part 2
- Part 3
- https://www.hackerone.com/blog-How-To-Server-Side-Request-Forgery-SSRF
- Part-I
- Part-II
- A-New-Era-Of-SSRF
- https://docs.google.com/document/d/1v1TkWZtrhzRLy0bYXBcdLUedXGb9njTNIJXa3u9akHM/edit
- https://github.com/jdonsec/AllThingsSSRF
- Web Security
- https://www.bugbountynotes.com/challenge?id=33
- SSRF_Vulnerable_Lab
- Websites mentioned in this blog
- https://www.acunetix.com/blog/articles/cross-site-request-forgery/
- https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
- https://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/
- https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f
- https://www.bugbountynotes.com/training/tutorial?id=5
- https://www.youtube.com/watch?v=eWEgUcHPle0
- http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html
- https://www.geekboy.ninja/blog/exploiting-misconfigured-cors-cross-origin-resource-sharing/
- https://dzone.com/articles/basics-of-cors
- https://medium.com/bugbountywriteup/stealing-user-details-by-exploiting-cors-c5ee86ebe7fb
- https://flaviocopes.com/cors/
- https://www.corben.io/tricky-CORS/
- https://www.corben.io/advanced-cors-techniques/
- https://brutelogic.com.br/blog/cors-enabled-xss/
- https://www.we45.com/blog/3-ways-to-exploit-misconfigured-cross-origin-resource-sharing-cors
- https://www.hackerone.com/blog/Guide-Subdomain-Takeovers
- https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/
- https://github.com/EdOverflow/can-i-take-over-xyz
- https://0xpatrik.com/subdomain-takeover-basics/
- https://blog.detectify.com/2019/01/10/what-is-server-side-request-forgery-ssrf/?fbclid=IwAR04OVp0vVViOvCvEtCWLKu0JC1sqp3pza4NNHgD3uSUf1CKncCuVh_2DfY
- https://www.acunetix.com/websitesecurity/directory-traversal/
- https://www.owasp.org/index.php/Path_Traversal
- http://securityidiots.com/Web-Pentest/LFI/guide-to-lfi.html
- https://www.noob.ninja/2017/11/local-file-read-via-xss-in-dynamically.html
- https://www.owasp.org/index.php/Command_Injection
- https://www.hackingarticles.in/beginner-guide-os-command-injection/
- https://www.acunetix.com/blog/web-security-zone/os-command-injection/
- https://www.hackerone.com/blog/how-to-command-injections
- https://www.bugcrowd.com/blog/advice-from-a-bug-hunter-xxe/
- https://www.synack.com/blog/a-deep-dive-into-xxe-injection/
- https://www.acunetix.com/blog/articles/xml-external-entity-xxe-vulnerabilities/
- https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing
- https://phonexicum.github.io/infosec/xxe.html
- https://www.youtube.com/watch?v=gjm6VHZa_8s
- https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards/
- https://blog.detectify.com/2016/05/25/owasp-top-10-insecure-direct-object-reference-4/
- https://www.owasp.org/index.php/Testing_for_Insecure_Direct_Object_References_(OTG-AUTHZ-004)
- https://www.bugbountynotes.com/training/tutorial?id=2
- https://medium.com/@vickieli/how-to-find-more-idors-ae2db67c9489
- https://www.youtube.com/watch?v=rloqMGcPMkI
- IDOR vulnerability automation
- https://portswigger.net/blog/practical-web-cache-poisoning
- https://portswigger.net/blog/bypassing-web-cache-poisoning-countermeasures
- https://portswigger.net/blog/server-side-template-injection
- https://www.netsparker.com/blog/web-security/server-side-template-injection/
- https://www.we45.com/blog/server-side-template-injection-a-crash-course-
- https://0day.work/jinja2-template-injection-filter-bypasses/
- https://gauravnarwani.com/injecting-6200-to-1200/
- https://hackerone.com/reports/125980
- https://s0cket7.com/open-redirect-vulnerability/
- https://www.bugbountynotes.com/training/tutorial?id=1
- https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher
- https://medium.com/@niruragu/so-you-want-to-be-a-security-engineer-d8775976afb7
- https://www.owasp.org/index.php/Category:Attack
- https://guides.rubyonrails.org/security.html
- https://medium.com/@sangeeta.igit/resources-for-web-application-penetration-testing-95f64bb8333f
- https://www.hacker101.com/
- https://www.bugcrowd.com/hackers/bugcrowd-university/
- https://blog.intigriti.com/
- https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
- https://portswigger.net/blog/
- http://securityidiots.com/
- Web Application Pentesting