Guidance and good learning material plays the most important roles while learning any new topic . in this post you will get will get the best ever learning path to learn complete ethical hacking.
Here you will get the resource link of every vulnerability , when you will click on suppose SQL injection vulnerability and various real world past scenario related to that.
we are consistently updating this page for new topics.
before that , you must follow the following post :
- Prerequisites of ethical hacking or what to learn before ethical hacking
- what is bug bounty hunting
- Learn Linux
- Learn burp suite
- practice hacking skills on a website
learning path :
Server Side Vulnerabilities :
- SQL injection
- Directory traversal
- Command injection
- Business logic vulnerabilities
- Authentication
- information disclosure
- Access Control
- File Upload vulnerabilities
- Server Side Request forgery (SSRF)
- XXE injection
- IDOR(Indirect Object Reference)
- Server Side Template Injection
Client Side Vulnerabilities :
- Cross-site scripting
- Cross-site request forgery
- Cross-origin resources sharing
- Clickjacking
- Dom-based Vulnerabilities
- Websokets
Other Vulnerabilities :
- Log4j attack
- Response manipulation
- subdomain takeover
- 404 bypass
- Remote Code Execution(RCE)
- spring boot Vulnerability
- Buffer overflow attack
- SS7 attack
Tools :
Popular topics:
Comments
Post a Comment