Information Gathering - Identify target IP addresses and domains. - Perform DNS enumeration. - Identify technologies used by the target (e.g., Wappalyzer). - Identify people related to the target
CSRF(Cross-Site Request Forgery) Understanding CSRF. CSRF attacks occur when a malicious actor tricks an authenticated user into unknowingly performing actions on a web application that they are
CSRF: Verify token presence on necessary forms (Create, Update, Delete)
Check server-side token length validation
Ensure server checks for token parameter
Test server response to empty parameter and
JWT for Beginners 1. JWT Overview: JSON Web Tokens (JWTs) are a compact, URL-safe means of representing claims between two parties. JWTs are often used for authentication, information exchange, and
List of websites that can be useful resources for ethical hackers, bug bounty hunters, and penetration testers. hackxpert labs - Practise labs for ethical hacking.
Bugcrowd - Another popular bug