SMK Muhammadiyah 2 Palembang
Ctrlk
  • Introducation
  • The Basics
  • Windows
  • Scripting With Python
  • Recon and Information Gathering Phase
  • Vulnerability analysis
    • Server-side Vulnerabilities
    • HTTP - Web Vulnerabilities
    • Attacking the user
      • Clickjacking
      • Broken Authentication or Session Management
      • Text/content-injection
      • Subdomain Takeover
      • Cross Site Request Forgery
      • Cross-site-scripting
      • Browser vulnerabilities
      • Java applet
      • Automated Vulnerability Scanners
    • Exploiting
    • Post Exploitation
  • Password Cracking
  • Pivoting - Port forwarding - Tunneling
  • Network traffic
  • Wifi
  • Physical access to machine
  • Literature
Powered by GitBook
On this page
  1. Vulnerability analysis
  2. Attacking the user

Text/content-injection

Relevant hackerone reports: https://hackerone.com/reports/145853

https://www.owasp.org/index.php/Content_Spoofing

PreviousBroken Authentication or Session ManagementNextSubdomain Takeover

Last updated 3 years ago