@@ -12,7 +12,10 @@ In every Web Pentest, there are **several hidden and obvious places that might b
1212
1313- [ ] [ ** Abusing hop-by-hop headers** ] ( abusing-hop-by-hop-headers.md )
1414- [ ] [ ** Cache Poisoning/Cache Deception** ] ( cache-deception/index.html )
15+ - [ ] [ ** HTTP Connection Contamination** ] ( http-connection-contamination.md )
16+ - [ ] [ ** HTTP Connection Request Smuggling** ] ( http-connection-request-smuggling.md )
1517- [ ] [ ** HTTP Request Smuggling** ] ( http-request-smuggling/ )
18+ - [ ] [ ** HTTP Response Smuggling / Desync** ] ( http-response-smuggling-desync.md )
1619- [ ] [ ** H2C Smuggling** ] ( h2c-smuggling.md )
1720- [ ] [ ** Server Side Inclusion/Edge Side Inclusion** ] ( server-side-inclusion-edge-side-inclusion-injection.md )
1821- [ ] [ ** Uncovering Cloudflare** ] ( ../network-services-pentesting/pentesting-web/uncovering-cloudflare.md )
@@ -29,6 +32,7 @@ In every Web Pentest, there are **several hidden and obvious places that might b
2932
3033If the introduced data may somehow be reflected in the response, the page might be vulnerable to several issues.
3134
35+ - [ ] [ ** Client Side Path Traversal** ] ( client-side-path-traversal.md )
3236- [ ] [ ** Client Side Template Injection** ] ( client-side-template-injection-csti.md )
3337- [ ] [ ** Command Injection** ] ( command-injection.md )
3438- [ ] [ ** CRLF** ] ( crlf-0d-0a.md )
@@ -61,6 +65,8 @@ If the functionality may be used to search some kind of data inside the backend,
6165- [ ] [ ** LDAP Injection** ] ( ldap-injection.md )
6266- [ ] [ ** ReDoS** ] ( regular-expression-denial-of-service-redos.md )
6367- [ ] [ ** SQL Injection** ] ( sql-injection/index.html )
68+ - [ ] [ ** ORM Injection** ] ( orm-injection.md )
69+ - [ ] [ ** RSQL Injection** ] ( rsql-injection.md )
6470- [ ] [ ** XPATH Injection** ] ( xpath-injection.md )
6571
6672### ** Forms, WebSockets and PostMsgs**
@@ -69,13 +75,15 @@ When a websocket posts a message or a form allowing users to perform actions vul
6975
7076- [ ] [ ** Cross Site Request Forgery** ] ( csrf-cross-site-request-forgery.md )
7177- [ ] [ ** Cross-site WebSocket hijacking (CSWSH)** ] ( websocket-attacks.md )
78+ - [ ] [ ** Phone Number Injections** ] ( phone-number-injections.md )
7279- [ ] [ ** PostMessage Vulnerabilities** ] ( postmessage-vulnerabilities/index.html )
7380
7481### ** HTTP Headers**
7582
7683Depending on the HTTP headers given by the web server some vulnerabilities might be present.
7784
7885- [ ] [ ** Clickjacking** ] ( clickjacking.md )
86+ - [ ] [ ** Iframe Traps / Click Isolation** ] ( iframe-traps.md )
7987- [ ] [ ** Content Security Policy bypass** ] ( content-security-policy-csp-bypass/index.html )
8088- [ ] [ ** Cookies Hacking** ] ( hacking-with-cookies/index.html )
8189- [ ] [ ** CORS - Misconfigurations & Bypass** ] ( cors-bypass.md )
@@ -87,6 +95,7 @@ There are several specific functionalities where some workarounds might be usefu
8795- [ ] [ ** 2FA/OTP Bypass** ] ( 2fa-bypass.md )
8896- [ ] [ ** Bypass Payment Process** ] ( bypass-payment-process.md )
8997- [ ] [ ** Captcha Bypass** ] ( captcha-bypass.md )
98+ - [ ] [ ** Account Takeover Playbooks** ] ( account-takeover.md )
9099- [ ] [ ** Login Bypass** ] ( login-bypass/index.html )
91100- [ ] [ ** Race Condition** ] ( race-condition.md )
92101- [ ] [ ** Rate Limit Bypass** ] ( rate-limit-bypass.md )
@@ -101,6 +110,7 @@ Some **specific functionalities** may be also vulnerable if a **specific format
101110- [ ] [ ** Deserialization** ] ( deserialization/index.html )
102111- [ ] [ ** Email Header Injection** ] ( email-injections.md )
103112- [ ] [ ** JWT Vulnerabilities** ] ( hacking-jwt-json-web-tokens.md )
113+ - [ ] [ ** JSON / XML / YAML Hacking** ] ( json-xml-yaml-hacking.md )
104114- [ ] [ ** XML External Entity** ] ( xxe-xee-xml-external-entity.md )
105115- [ ] [ ** GraphQL Attacks** ] ( ../network-services-pentesting/pentesting-web/graphql.md )
106116- [ ] [ ** gRPC-Web Attacks** ] ( grpc-web-pentest.md )
@@ -131,5 +141,74 @@ These vulnerabilities might help to exploit other vulnerabilities.
131141- [ ] [ ** Parameter Pollution** ] ( parameter-pollution.md )
132142- [ ] [ ** Unicode Normalization vulnerability** ] ( unicode-injection/index.html )
133143
144+ ### ** Web Servers & Middleware**
145+
146+ Misconfigurations in the edge stack often unlock more impactful bugs in the application layer.
147+
148+ - [ ] [ ** Apache** ] ( ../network-services-pentesting/pentesting-web/apache.md )
149+ - [ ] [ ** Nginx** ] ( ../network-services-pentesting/pentesting-web/nginx.md )
150+ - [ ] [ ** IIS** ] ( ../network-services-pentesting/pentesting-web/iis-internet-information-services.md )
151+ - [ ] [ ** Tomcat** ] ( ../network-services-pentesting/pentesting-web/tomcat/ )
152+ - [ ] [ ** Spring Actuators** ] ( ../network-services-pentesting/pentesting-web/spring-actuators.md )
153+ - [ ] [ ** PUT Method / WebDAV** ] ( ../network-services-pentesting/pentesting-web/put-method-webdav.md )
154+ - [ ] [ ** Special HTTP Headers** ] ( ../network-services-pentesting/pentesting-web/special-http-headers.md )
155+ - [ ] [ ** WSGI Deployment** ] ( ../network-services-pentesting/pentesting-web/wsgi.md )
156+ - [ ] [ ** Werkzeug Debug Exposure** ] ( ../network-services-pentesting/pentesting-web/werkzeug.md )
157+
158+ ### ** Application Frameworks & Stacks**
159+
160+ Framework-specific primitives frequently expose gadgets, dangerous defaults, or framework-owned endpoints.
161+
162+ - [ ] [ ** Django** ] ( ../network-services-pentesting/pentesting-web/django.md )
163+ - [ ] [ ** Flask** ] ( ../network-services-pentesting/pentesting-web/flask.md )
164+ - [ ] [ ** NodeJS / Express** ] ( ../network-services-pentesting/pentesting-web/nodejs-express.md )
165+ - [ ] [ ** Angular** ] ( ../network-services-pentesting/pentesting-web/angular.md )
166+ - [ ] [ ** Vue / Nuxt** ] ( ../network-services-pentesting/pentesting-web/vuejs.md )
167+ - [ ] [ ** Next.js** ] ( ../network-services-pentesting/pentesting-web/nextjs.md )
168+ - [ ] [ ** Laravel** ] ( ../network-services-pentesting/pentesting-web/laravel.md )
169+ - [ ] [ ** Symfony** ] ( ../network-services-pentesting/pentesting-web/symphony.md )
170+
171+ ### ** CMS, SaaS & Managed Platforms**
172+
173+ High-surface products often ship with known exploits, weak plugins, or privileged admin endpoints.
174+
175+ - [ ] [ ** WordPress** ] ( ../network-services-pentesting/pentesting-web/wordpress.md )
176+ - [ ] [ ** Joomla** ] ( ../network-services-pentesting/pentesting-web/joomla.md )
177+ - [ ] [ ** Drupal** ] ( ../network-services-pentesting/pentesting-web/drupal/ )
178+ - [ ] [ ** Moodle** ] ( ../network-services-pentesting/pentesting-web/moodle.md )
179+ - [ ] [ ** Prestashop** ] ( ../network-services-pentesting/pentesting-web/prestashop.md )
180+ - [ ] [ ** Atlassian Jira** ] ( ../network-services-pentesting/pentesting-web/jira.md )
181+ - [ ] [ ** Grafana** ] ( ../network-services-pentesting/pentesting-web/grafana.md )
182+ - [ ] [ ** Rocket.Chat** ] ( ../network-services-pentesting/pentesting-web/rocket-chat.md )
183+ - [ ] [ ** Zabbix** ] ( ../network-services-pentesting/pentesting-web/zabbix.md )
184+ - [ ] [ ** Microsoft SharePoint** ] ( ../network-services-pentesting/pentesting-web/microsoft-sharepoint.md )
185+ - [ ] [ ** Sitecore** ] ( ../network-services-pentesting/pentesting-web/sitecore/ )
186+
187+ ### ** APIs, Buckets & Integrations**
188+
189+ Server-side helpers and third-party integrations can expose file parsing or storage-layer weaknesses.
190+
191+ - [ ] [ ** Web API Pentesting** ] ( ../network-services-pentesting/pentesting-web/web-api-pentesting.md )
192+ - [ ] [ ** Storage Buckets & Firebase** ] ( ../network-services-pentesting/pentesting-web/buckets/ )
193+ - [ ] [ ** Imagemagick Security** ] ( ../network-services-pentesting/pentesting-web/imagemagick-security.md )
194+ - [ ] [ ** Artifactory & Package Registries** ] ( ../network-services-pentesting/pentesting-web/artifactory-hacking-guide.md )
195+ - [ ] [ ** Code Review Tooling** ] ( ../network-services-pentesting/pentesting-web/code-review-tools.md )
196+
197+ ### ** Supply Chain & Identifier Abuse**
198+
199+ Attacks that target build pipelines or predictable identifiers can become the initial foothold before exploiting traditional bugs.
200+
201+ - [ ] [ ** Dependency Confusion** ] ( dependency-confusion.md )
202+ - [ ] [ ** Timing Attacks** ] ( timing-attacks.md )
203+ - [ ] [ ** UUID Insecurities** ] ( uuid-insecurities.md )
204+
205+ ### ** Web3, Extensions & Tooling**
206+
207+ Modern applications extend into browsers, wallets, and automation pipelines—keep these vectors in scope.
208+
209+ - [ ] [ ** dApps / Decentralized Applications** ] ( dapps-DecentralizedApplications.md )
210+ - [ ] [ ** Browser Extension Pentesting** ] ( browser-extension-pentesting-methodology/ )
211+ - [ ] [ ** wfuzz Web Fuzzing** ] ( web-tool-wfuzz.md )
212+
134213
135214{{#include ../banners/hacktricks-training.md}}
0 commit comments