Pentesting notes
search
⌘Ctrlk
Pentesting notes
  • 🏠/home/kabaneridev/.pt-notes
  • πŸ†Certification Preparation
    • βœ…CPTS - Completed
    • πŸ“˜CWEE Preparation
      • Injection Attacks
      • Attacking Authentication Mechanisms
      • Advanced XSS and CSRF Exploitation
        • Lab Environment
        • [CSRF Exploitation]
        • [XSS Exploitation]
          • Introduction
          • Launching Attacks from Victim's Session
          • Enumerating Internal APIs
          • Exploiting Internal Web Apps I
          • Exploiting Internal Web Apps II
          • Content-Security Policy (CSP)
          • Bypassing Weak CSPs
          • XSS Filter Bypasses
          • XSS Prevention
        • Skills Assessment
      • Abusing HTTP Misconfigurations
      • HTTP Attacks
      • HTTPS/TLS Attacks
      • Blind SQL Injection
      • Whitebox Pentesting
      • Modern Web Exploitation
      • [Deserialization Attacks]
    • βœ…PJPT - Completed
  • πŸ”§Core Knowledge Areas
    • πŸ”Information Gathering
    • 🐧Linux Privilege Escalation
    • πŸͺŸWindows Privilege Escalation
    • πŸ› οΈTools & Utilities
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ†Certification Preparationchevron-right
  2. πŸ“˜CWEE Preparationchevron-right
  3. Advanced XSS and CSRF Exploitation

[XSS Exploitation]

Introductionchevron-rightLaunching Attacks from Victim's Sessionchevron-rightEnumerating Internal APIschevron-rightExploiting Internal Web Apps Ichevron-rightExploiting Internal Web Apps IIchevron-rightContent-Security Policy (CSP)chevron-rightBypassing Weak CSPschevron-rightXSS Filter Bypasseschevron-rightXSS Preventionchevron-right
PreviousCSRF Preventionchevron-leftNextIntroductionchevron-right

Last updated 3 months ago