Pentesting notes
CtrlK
  • ๐Ÿ /home/kabaneridev/.pt-notes
  • ๐Ÿ†Certification Preparation
    • โœ…CPTS - Completed
    • ๐Ÿ“˜CWEE Preparation
      • Injection Attacks
      • Attacking Authentication Mechanisms
      • Advanced XSS and CSRF Exploitation
        • Introduction to the Lab Environment
        • Lab Warmup
        • Same-Origin Policy & CORS
        • [CSRF Exploitation]
        • [XSS Exploitation]
          • XSS Exploitation (Introduction)
          • Launching Attacks from the Victim's Session
          • Enumerating Internal APIs
          • Exploiting internal Web Applications I
          • Exploiting internal Web Applications II
          • Content-Security Policy (CSP)
          • Bypassing Weak CSPs
          • XSS Filter Bypasses
          • XSS Vulnerability Prevention
        • Skills Assessment
      • [HTTPS/TLS Attacks]
    • โœ…PJPT - Completed
  • ๐Ÿ”งCore Knowledge Areas
    • ๐Ÿ”Information Gathering
    • ๐ŸงLinux Privilege Escalation
    • ๐ŸชŸWindows Privilege Escalation
    • ๐Ÿ› ๏ธTools & Utilities
Powered by GitBook
On this page
  1. ๐Ÿ†Certification Preparation
  2. ๐Ÿ“˜CWEE Preparation
  3. Advanced XSS and CSRF Exploitation

[XSS Exploitation]

XSS Exploitation (Introduction)Launching Attacks from the Victim's SessionEnumerating Internal APIsExploiting internal Web Applications IExploiting internal Web Applications IIContent-Security Policy (CSP)Bypassing Weak CSPsXSS Filter BypassesXSS Vulnerability Prevention
PreviousCSRF Vulnerability PreventionNextXSS Exploitation (Introduction)

Last updated 2 days ago