Web applications

are an important part of our lives. These days if one has any problem,one can look it up on the internet. But what if the Google or Bing it unavailable. If you haven't thought about it before, Google went down for an hour (in early 2021).
People were unable to access the services that google provided , be it drive,email, cloud computing ,etc.People were locked out of their own houses as they were using Google Powered IoT devices for their lock systems.

If you think that your website is safe, then think again. Study the following topics and check it out for yourself.

If you want to be a penetration tester,then Web Site Pentesting is not going to leave you anytime soon.

Topics

card
5 Stages

Learn About the 5 stages of Hacking.

card
Local File Inclusion

Introduction to Local File Inclusion Vulnerability.

card
Java Serialzation and Deserialzation

Introduction to Java Serialzation and Deserialzation.

card
JWT: Json Web Tokens

It is a compact and self-contained way for securely transmitting information between parties as a JSON object.

card
Information Disclosure

Learn how leaving some sensitive information hard-coded can leave you vulnerable.

card
OS Command Injection

Learn how an attacker can use this Vulnerability to execute malicious commands.

card
Blind OS Command Injection

Even if results aren't being fetched to us, doesn't mean the site isn't vulnerable.

card
Code Injection

Similar to Command Injection, but here we are restriced by a particlur language interpreter.

card
Cross Site Scripting

XSS allows malicious actors to inject malicious javascript code to the web applications.