Exploitation

Web Application

File Traversal (LFI – RFI)

Injection

Code Injection
File Upload
Access Control
Session Management
Authentication
XXE
CMS

API

Post-Exploitation

Linux – Post-Exploitation

Enumeration Post-Exploitation
SUDO
SUID & Sudo
Capabilities
Scheduled Tasks
CVE
Misconfig

Dumping Credentials

    Programming

    Windows – Post-Exploitation

    CVE Exploits
    Enumeration Post-Exploitation
    Dumping Credentials
    Misconfiguration

    DLL hijacking

    Service Path Permissions

    Registry

    Impersonation

    Scheduled Tasks

    Reverse Engineering