Web Penetration Testing - Web Application Firewall (waf)
![DOM-Based XSS Attacks: Detection and Prevention](https://images.ctfassets.net/1kaqtc248p95/4PuItcoXUQqm49CPI8q3ew/d81fc56e0a70ae176eb2aae0b7d8c158/dom-based-cross-site-scripting-vulnerability.jpg)
DOM-Based XSS Attacks: Detection and Prevention
July 27, 2023
![Server-Side Request Manipulation: Exploitation Techniques](https://images.ctfassets.net/1kaqtc248p95/68KAaiWi82aEJrxU47fitW/c7339a56515a8eb5d949261937b11c55/Server-Side-Request-Forgery-SSRF.png)
Server-Side Request Manipulation: Exploitation Techniques
July 16, 2023
![Business Logic Flaws in Web Applications: Detection and Exploitation](https://images.ctfassets.net/1kaqtc248p95/1y1GsDk6AGM0YQqX12Ya4Z/423f72b05fed8cb2b4ffc6efda48bf4c/business-logic-vulnerabilities.webp)
Business Logic Flaws in Web Applications: Detection and Exploitation
July 24, 2023
![Web Application Security Scanning Tools: A Comparative Analysis](https://images.ctfassets.net/1kaqtc248p95/Uk9rT3fMxMHKrFLwzMtea/e11fed1a13dbae16cddf7e10a082daa0/1570190198VxSgRtAkwC.jpg)
Web Application Security Scanning Tools: A Comparative Analysis
July 12, 2023
![Remote File Inclusion (RFI) and Local File Inclusion (LFI) Attacks](https://images.ctfassets.net/1kaqtc248p95/4T8gAAvn7kJbaAu6TQ8Trx/e0f269ae9cb2a69346b3ec1e64b38efd/Local-File-Inclusion-LFI.png)
Remote File Inclusion (RFI) and Local File Inclusion (LFI) Attacks
July 11, 2023
![XML External Entity (XXE) Attacks](https://images.ctfassets.net/1kaqtc248p95/2wOm2Y2cP8f7dxu1apLfoe/8291f68bdf727aedad92ff29a61a60f6/Rebuild-image-for-blog-1024x538.png)
XML External Entity (XXE) Attacks
July 11, 2023
![Exploiting File Upload Vulnerabilities in Web Applications](https://images.ctfassets.net/1kaqtc248p95/5YNXNax24pbQLiSaozWwAF/94a4fcf6b25b7811370a02bd40112b47/logo.png)
Exploiting File Upload Vulnerabilities in Web Applications
July 10, 2023
![Web Application Firewalls (WAFs): How They Work and Their Limitations](https://images.ctfassets.net/1kaqtc248p95/3mU4q4zzoh7trpWguJ44xj/2302a84dd7f7fc3cd36f41ba317de0b7/waf.webp)
Web Application Firewalls (WAFs): How They Work and Their Limitations
July 8, 2023
![Server-Side Request Forgery (SSRF) Exploitation in Cloud Metadata Services](https://images.ctfassets.net/1kaqtc248p95/3U3AAuUDx4p6YRuIbDlce9/4ee136b6004e09f5842ce9ad6eabe8f8/SSRF-1.webp)
Server-Side Request Forgery (SSRF) Exploitation in Cloud Metadata Services
July 8, 2023
![Directory Traversal Attack Case Study](https://images.ctfassets.net/1kaqtc248p95/2y71sG7CzIWqfBYSwg2Upt/57fc4018297f5fc2effba5246fbc5da9/Directory-Traversal-Attack-1200x630-1.png)
Directory Traversal Attack Case Study
July 7, 2023
![What is a Server-Side Request Forgery (SSRF) and how can they be prevented?](https://images.ctfassets.net/1kaqtc248p95/3jBp0rUjdl8UZFOx29FHFi/d1587bd78d8dc4822ff305b2b02a098a/Picture1.jpg)
What is a Server-Side Request Forgery (SSRF) and how can they be prevented?
July 6, 2023
![CVE-2022-34265 Exploit Step-by-Step](https://images.ctfassets.net/1kaqtc248p95/4kOVYdrE0RI1Y6tRdFfmjt/6eac7d917ba3013042efe7f396639dab/exploit.jpg)
CVE-2022-34265 Exploit Step-by-Step
June 9, 2023