Hackervice
Ctrlk
LinkedInGitHub
  • 🤓Welcome to HackerVice
  • 🧪CTF / Labs
    • HTB Certified Bug Bounty Hunter
      • Information Gathering
      • Attacking Web Applications with Ffuf
      • JavaScript Deobfuscation
      • Cross-Site Scripting (XSS)
      • SQL Fundamentals
      • SQLMap Essentials
      • Command Injections
      • File Upload Attacks
      • Server-side attacks
      • Login Brute Forcing
      • Broken Authentication
      • Web Attacks
        • Bypassing Basic Authentication
        • Bypassing Security Filters
        • Mass IDOR Enumeration
        • Bypassing Encoded References
        • IDOR in Insecure APIs
        • Chaining IDOR Vulnerabilities
        • Local File Disclosure
        • Advanced File Disclosure
        • Blind Data Exfiltration
        • Skills Assessment
      • File Inclusion
      • Session Security
      • Web Service & API Attacks
      • Hacking WordPress
  • 🌐Web Applications
  • 👾Server-side vulnerabilities
  • 🖥️Active Directory
  • 🐚Shells
  • ⤴️Privilege Escalation
  • ⚒️Projects
  • Wordlists
  • Tools
  • Interesting Files
Powered by GitBook
On this page
  1. 🧪CTF / Labs
  2. HTB Certified Bug Bounty Hunter

Web Attacks

Bypassing Basic AuthenticationBypassing Security FiltersMass IDOR EnumerationBypassing Encoded ReferencesIDOR in Insecure APIsChaining IDOR VulnerabilitiesLocal File DisclosureAdvanced File DisclosureBlind Data ExfiltrationSkills Assessment
PreviousSkills AssessmentNextBypassing Basic Authentication