1. Web Security Academy
  2. All materials

All learning materials

See detailed view

OAuth 2.0 authentication vulnerabilities
     How to prevent OAuth authentication vulnerabilities
     OAuth grant types
     OpenID Connect
HTTP Host header attacks
     How to identify and exploit HTTP Host header vulnerabilities
          Password reset poisoning
Business logic vulnerabilities
     Examples of business logic vulnerabilities
Web cache poisoning
     Exploiting cache design flaws
     Exploiting cache implementation flaws
SQL injection
     SQL injection UNION attacks
     Examining the database in SQL injection attacks
     Blind SQL injection
     SQL injection cheat sheet
Cross-site scripting
     Reflected XSS
     Cross-site scripting (XSS) cheat sheet
     Stored XSS
     DOM-based XSS
     Exploiting cross-site scripting vulnerabilities
     Cross-site scripting contexts
          AngularJS sandbox
     Content security policy
     Dangling markup injection
     How to prevent XSS
Cross-site request forgery (CSRF)
     Defending against CSRF with SameSite cookies
     XSS vs CSRF
     CSRF tokens
XML external entity (XXE) injection
     XML entities
     Finding and exploiting blind XXE vulnerabilities
Clickjacking (UI redressing)
Cross-origin resource sharing (CORS)
     Same-origin policy (SOP)
     CORS and the Access-Control-Allow-Origin response header
Server-side request forgery (SSRF)
     Blind SSRF vulnerabilities
HTTP request smuggling
     Finding HTTP request smuggling vulnerabilities
     Exploiting HTTP request smuggling vulnerabilities
OS command injection
Server-side template injection
     Exploiting server-side template injection vulnerabilities
Insecure deserialization
     Exploiting insecure deserialization vulnerabilities
Directory traversal
Access control vulnerabilities and privilege escalation
     Access control security models
     Insecure direct object references (IDOR)
Authentication vulnerabilities
     Vulnerabilities in password-based login
     Vulnerabilities in multi-factor authentication
     Vulnerabilities in other authentication mechanisms
     Authentication lab usernames
     Authentication lab passwords
     How to secure your authentication mechanisms
Testing for WebSockets security vulnerabilities
     What are WebSockets?
     Cross-site WebSocket hijacking
DOM-based vulnerabilities
     Controlling the web message source
     DOM-based open redirection
     DOM-based cookie manipulation
     DOM-based JavaScript injection
     DOM-based document-domain manipulation
     DOM-based WebSocket-URL poisoning
     DOM-based link manipulation
     Web message manipulation
     DOM-based Ajax request-header manipulation
     DOM-based local file-path manipulation
     DOM-based client-side SQL injection
     DOM-based HTML5-storage manipulation
     DOM-based client-side XPath injection
     DOM-based client-side JSON injection
     DOM-data manipulation
     DOM-based denial of service
     DOM clobbering
Information disclosure vulnerabilities
     How to find and exploit information disclosure vulnerabilities
     Augmenting your manual testing with Burp Scanner
     Obfuscating attacks using encodings
Getting started with the Web Security Academy
Web Security Academy
Welcome back!