Home
cyberkhalid
Cancel

Server-Side Template Injection

Server-Side Template Injection(SSTI) Server Side Template Injection vulnerabilities (SSTI) occur when user input is embedded in a template in an unsafe manner and results in remote code execution ...

Local File Inclusion

Local File Inclusion Local file inclusion (also known as LFI) is a vulnerability that allows attacker to includes files that are already locally present on the server i.e /etc/passwd which can lea...

LDAP Injection

LDAP Injection LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. Detecting LDAP Injection From the below image, we have been ...

Path traversal

Path traversal Path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference ...

CRLF Injection

CRLF Injection A Carriage Return Line Feed (CRLF) Injection vulnerability is a type of Server Side Injection which occurs when an attacker inserts the CRLF characters in an input field to deceive ...

Blind Command Injection

Blind Command Injection Blind Command Injection is a cyber attack that involves executing arbitrary commands on a host operating system (OS) but does not return the output from the command within...

Command Injection

Command Injection Command Injection is a cyber attack that involves executing arbitrary commands on a host operating system (OS). Command injection attacks are possible when an application passes ...

Blind XML External Entity

Blind XML External Entity Blind XXE vulnerabilities arise where the application is vulnerable to XXE injection but does not return the values of any defined external entities within its responses....

Reconnaissance

Recon

Privilege Escalation

Privilege Escalation