Hacking Knowledge
Ctrlk
  • 🏠​ Homepage
    • Welcome
    • About Me
    • Disclaimer
    • Conventions
  • 🔑Cybersecurity Basics
    • Introduction
    • Vulnerabilities
    • Cyberattacks
    • Security Models
    • Secure Design
    • Legal Support
    • Career Paths
    • Certifications
    • Related Concepts
  • 🐧Linux
    • Introduction
    • Functional Structure
    • Commands
    • Useful Shell Resources
    • Related Concepts
  • ⊞ Windows
    • Introduction
    • Functional Structure
    • Commands
    • Related Concepts
  • 🌐Networks
    • Introduction
    • Networking Frameworks
    • Protocols
    • Hypervisors
    • Related Concepts
    • Tools and Utilities
  • 🔐Cryptography
    • Introduction
    • Fundamental Concepts
    • Attack Techniques (WIP)
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 🎯Penetration Testing
    • Introduction
    • Pentesting vs Bug Bounty vs Red Teaming
    • Categorization
    • Process Stages
    • Related Concepts
  • 📡Web Exploitation
    • Introduction
    • Fundamentals
    • OWASP Top 10
    • HTTP Security Considerations (WIP)
    • Web Vulnerabilities
      • Broken Access Control
      • Information Disclosure
      • Path Traversal
      • Server-Side Request Forgery
      • Local File Inclusion (WIP)
      • Vulnerable and Outdated Components (WIP)
      • Software and Data Integrity Failures (WIP)
      • Security Logging and Monitoring Failures (WIP)
      • Identification and Authentication Failures (WIP)
      • Security Misconfiguration (WIP)
      • Open Redirect (WIP)
      • Injection (WIP)
      • Insecure Design (WIP)
      • Cryptographic Failures (WIP)
      • Authentication Failures (WIP)
      • Remote File Inclusion (WIP)
      • Cross-Site Scripting (WIP)
      • OS Command injection (WIP)
      • XXE Injection (WIP)
      • Abuse File Upload (WIP)
      • Header Poisoning (WIP)
      • HTTP Parameter Pollution (WIP)
      • Content Security Policy Bypass (WIP)
      • Server-Side Template Injection (WIP)
      • Cross-Site Request Forgery (WIP)
      • Cookie Hijacking (WIP)
      • PHP - Abuse PHP Type Juggling (WIP)
      • PHP - Bypass using filters (WIP)
      • WordPress - Abuse Theme Configuration on templates (WIP)
      • WordPress - Getting credentials from configuration files (WIP)
      • CVE - Log4Shell (WIP)
      • CVE - Shellshock (WIP)
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 🗄️Database Attacks
    • Introduction
    • SQL
    • NoSQL
    • Attack Techniques
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 👥Active Directory Hacking
    • Introduction
    • Fundamentals
    • Related Concepts
    • Tools and Utilities (WIP)
    • Useful Tips (WIP)
  • ☁️CLOUD HACKING
    • Introduction
    • Related Concepts
    • Tools and Utilities (WIP)
    • Useful Tips (WIP)
  • 👣Digital Forensics
    • Introduction
    • Basic Plan
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 🚩Practical Skill Development
    • Learning Platforms
    • Featured Labs
    • CTF Competitions
  • 📝Write-Ups
    • Introduction
    • HTB Starting Point
    • HTB Machines
    • HTB Challenges
    • HTB Advanced labs
Powered by GitBook
On this page
  1. 📡Web Exploitation
  2. Web Vulnerabilities

Open Redirect (WIP)

PreviousSecurity Misconfiguration (WIP)NextInjection (WIP)

Last updated 2 months ago