SavitarX
search
⌘Ctrlk
LinkedinTryHackme
SavitarX
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
    • Web Pentesting
      • CWES
        • Web Requests
        • Information Gathering - Web Edition
        • Attacking Web Applications with Ffuf
        • JavaScript Deobfuscation
        • Cross-Site Scripting (XSS)
        • SQL Injection Fundamentals
        • SQLMap Essentials
        • Command Injections
        • File Upload Attacks
        • Server-Side Attacks
          • SSRF Exploitation Example
          • Blind SSRF Exploitation Example
          • SSI Injection Exploitation Example
          • SSTI Identification
          • SSTI Exploitation Example 1
          • SSTI Exploitation Example 2
          • SSTI Exploitation Example 3
          • Skills Assessment
        • Login Brute Forcing
        • Broken Authentication
        • Web Attacks
        • File Inclusion
        • Hacking WordPress
  • Writeups
    • Tryhackme
    • HTB Sherlocks
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CERTIFICATIONS & noteschevron-right
  2. Web Pentestingchevron-right
  3. CWES

Server-Side Attacks

SSRF Exploitation Examplechevron-rightBlind SSRF Exploitation Examplechevron-rightSSI Injection Exploitation Examplechevron-rightSSTI Identificationchevron-rightSSTI Exploitation Example 1chevron-rightSSTI Exploitation Example 2chevron-rightSSTI Exploitation Example 3chevron-rightSkills Assessmentchevron-right
PreviousQuestion-2chevron-leftNextSSRF Exploitation Examplechevron-right