WorkflowHacking trainingJanuary 25th, 20221. Warm up1 Introduction2 Disclaimer3 Methodology2. Environment setup1 In this section2 Setting up the target3 Setting up Kali4 Setting up the Burp Suite3. Web 1011 In this section2 How HTTP works3 Static HTML4 PHP and friends5 Modern MVC frameworks6 Javascript4. Application discovery1 Manual discovery2 Automated discovery5. Attacking session management1 Session management intro2 Session fixation3 Weak logout4 Same origin policy5 CSRF6 Securing the session6. Attacking authentication1 SSLTLS2 Authentication bypass3 Unauthenticated URL access4 Password quality5 Password brute force6 Default accounts7 Weak password recovery8 Mitigations7. Attacking authorization1 Authorization Intro2 Manipulating variables3 Client side authentication4 Mitigations8. Attacking the client1 Reflected XSS2 Stored XSS3 HTTP header injection4 Malicious URL redirection5 Exploiting wrong content-type6 Mitigations9. Server side injections1 Malicious file upload2 LFI and RFI3 OS command injection4 SQL injection5 UNION Select Attack6 Blind SQL injection7 Automating SQLi testing8 Mitigations10. The rest1 Reporting2 Checklist3 What's nextall posts