🦹
CYBERSECURITY BOOK
search
⌘Ctrlk
🦹
CYBERSECURITY BOOK
  • 👽CS && PEN-TESTING BOOK
    • 🔍Reconnaissance
    • 🔢Enumeration
    • ☮️Public Exploits
    • 🕎Vulnerability Scanning
    • 🕳️Tunneling & Exfiltration
    • door-closedBackdoors
    • 🌠Exploiting VPNs
    • 🎣Pivoting (Post Exploitation)
    • 🎯Active Directory Pentesting
    • 🐳Docker
    • ☸️Kubernetes
    • 🙅‍♂️Social Engineering
    • 🗺️CEH Mindmaps
    • 🗾CND Mindmaps
    • 👿Vulnerability Research
    • 📶Network Security
    • 🛂Port Forwarding
    • 👾API Testing
    • 🕸️Web App Pentesting Notes
    • 🛩️Wireless Hacking
    • 🏁CEH Engage Walkthroughs
    • 🎃Evasion
    • 🚪Post exploitation
    • 🔓Hashing & Password Cracking
    • 📒Hacking Cheat Sheets
    • 🏇CEH Practical
    • ☁️Cloud Pentesting
    • 🪟Windows Security
    • 🐧Linux Security
    • 🍎MacOS Security
    • 📱Android Security
    • 🍎iOS Security
    • 🧾Scripting
    • 🐉Reverse Engineering & Malware Analysis
    • 🌠Protocol Exploitation
    • 🛜Network Pentesting
    • 👮Digital Forensics & Incident Response
    • 🦋Cisco Attacks
    • 🐼CVE's
    • 🐛OWASP TOP 10
      • message-botLLM
      • head-side-gearMachine Learning
      • 🕸️WEB
        • 1️⃣ A01:2021 – Broken Access Control
        • 2️⃣ A02:2021 – Cryptographic Failures
        • 3️⃣ A03:2021 – Injection
        • 4️⃣ A04:2021 – Insecure Design
        • 5️⃣ A05:2021 – Security Misconfiguration
        • 6️⃣ A06:2021 – Vulnerable and Outdated Components
        • 7️⃣ A07:2021 – Identification and Authentication Failures
        • 8️⃣ A08:2021 – Software and Data Integrity Failures
        • 9️⃣ A09:2021 – Security Logging and Monitoring Failures
        • 🔟A10:2021 – Server-Side Request Forgery (SSRF)
      • 🦄API
      • 🌆IoT
      • 📱MOBILE
    • 🛼Web 3 Vulnerabilities
    • 🛩️Web 3 Smart Contract
    • 🌃Smart Contract Audits
    • 👩‍💼GRC Frameworks
  • 🦹REAL WORLD && CTF
  • 🦸MISCELLANEOUS
  • 🧛‍♂️ADVANCED PERSISTENT THREATS - RESEARCH
  • 👾THREAT HUNTING - RESEARCH
  • 🦅CISA - INCIDENT RESPONSE PLAYBOOK
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 👽CS && PEN-TESTING BOOKchevron-right
  2. 🐛OWASP TOP 10

🕸️WEB

1️⃣ A01:2021 – Broken Access Controlchevron-right2️⃣ A02:2021 – Cryptographic Failureschevron-right3️⃣ A03:2021 – Injectionchevron-right4️⃣ A04:2021 – Insecure Designchevron-right5️⃣ A05:2021 – Security Misconfigurationchevron-right6️⃣ A06:2021 – Vulnerable and Outdated Componentschevron-right7️⃣ A07:2021 – Identification and Authentication Failureschevron-right8️⃣ A08:2021 – Software and Data Integrity Failureschevron-right9️⃣ A09:2021 – Security Logging and Monitoring Failureschevron-right🔟A10:2021 – Server-Side Request Forgery (SSRF)chevron-right
PreviousOWASP Machine Learning Security Top Tenchevron-leftNext1️⃣ A01:2021 – Broken Access Controlchevron-right