logo
Tom Fieber (@pawpawhacks)
Index
tomfieber/tomfieber.github.io
  • Home
  • Interview Questions
  • Writeups
  • Projects
  • Resources
tomfieber/tomfieber.github.io
  • Home
      • General Cybersecurity Questions
  • Writeups
  • Projects
    • Web Development
    • Courses
  • Resources
      • Create an Ubuntu VM
          • Exploiting a mass assignment vulnerability
          • Username enumeration via different responses
          • 2FA simple bypass
          • Password reset broken logic
          • Username enumeration via subtly different responses
          • Username enumeration via response timing
          • 2FA broken logic
          • Brute-forcing a stay-logged-in cookie
          • Unprotected admin functionality
          • Multi-step process with no access control on one step
          • Referer-based access control
          • User ID controlled by request parameter
          • Insecure direct object references
          • DOM-based open redirection
          • JWT authentication bypass via unverified signature
          • JWT authentication bypass via flawed signature verification
          • JWT authentication bypass via jwk header injection
          • Exploiting NoSQL operator injection to bypass authentication
          • File path traversal, simple case
          • File path traversal, traversal sequences blocked with absolute path bypass
          • File path traversal, validation of start of path
          • Limit overrun race conditions
          • Single-endpoint race conditions
          • Blind SQL injection with conditional errors
          • SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
          • SQL injection vulnerability allowing login bypass
          • SQL injection attack, querying the database type and version on Oracle
          • SQL injection attack, querying the database type and version on MySQL and Microsoft
          • SQL injection attack, listing the database contents on non-Oracle databases
          • Blind SQL injection with conditional responses
          • Basic SSRF against the local server
          • Basic SSRF against another back-end system
          • Blind SSRF with out-of-band detection
          • Blind SSRF with Shellshock exploitation
          • Manipulating WebSocket messages to exploit vulnerabilities
          • Cross-site WebSocket hijacking
          • Manipulating the WebSocket handshake to exploit vulnerabilities
          • Reflected XSS into HTML context with nothing encoded
          • Stored XSS into HTML context with nothing encoded
          • DOM XSS in document.write sink using source location.search
          • Stored XSS into anchor href attribute with double quotes HTML-encoded
          • Reflected XSS into a JavaScript string with angle brackets HTML encoded
          • DOM XSS in document.write sink using source location.search inside a select element
          • Reflected XSS into HTML context with most tags and attributes blocked
          • Exploiting cross-site scripting to steal cookies
          • Exploiting XXE using external entities to retrieve files
          • Blind XXE with out-of-band interaction
          • Exploiting XInclude to retrieve files
          • Exploiting XXE via image file upload
          • Simple Login Bypass
          • First Exfiltration
          • No Limit
          • Exploration
          • Injection in Insert
          • Filter Bypass
          • Simple Login Bypass
        • Broken Access Control Cheatsheet
        • CORS Cheatsheet
        • CSRF Cheatsheet
        • Local File Disclosure Cheatsheet
        • Open Redirect Cheatsheet
        • SQL Injection Cheatsheet
        • File Upload Cheatsheet
        • XPath Injection
        • XSS Cheatsheet
        • OWASP Web Security Testing Guide (WSTG) Checklist
  1. Home
  2. Projects
  3. Courses

Index

Previous
Index
Next
Resources
Copyright © 2025 Tom Fieber
Made with Zensical