📙
AppSec
  • Overview
  • Write Ups Compilations/Resources
  • Main Resources
  • Labs
  • Cross Site Request Forgery
    • Cross Site Request Forgery (CSRF)
      • Write-ups
      • Source Code Examples
      • Labs
  • Missing Access Controls
    • Missing Access Controls
      • Write-ups
      • Source Code Examples
      • Resources
      • Testing Tips
  • LFI / Directory Traversal
    • Local File Inclusion
      • Local File Inclusion Writeups
      • Source Code Examples
      • Labs
  • XXE
    • XML External Entity (XXE)
      • Write-ups
      • Source Code Examples
      • Labs
      • More Writeups
      • Payloads
      • Resources
  • Injection
    • Command Injection
      • Writeups
    • Server-Side Template Injection
      • Server-Side Template Injection Writeups
      • More Write-ups
      • Source Code Examples
      • Labs
      • Resources
      • Payloads
      • Tools
    • SQL Injection
      • SQLI Write-ups
      • Source Code Examples
      • More Write-ups
      • Labs
      • Resources & Tools
  • SSRF
    • Server-Side Request Forgery (SSRF)
      • SSRF Write-ups
      • Source Code Review
  • Unvalidated Redirects and Forwards
    • Unvalidated Redirects and Forwards
      • Writeups
      • Source Code Examples
  • Verbose Error Messages and Stack Traces
    • Verbose Error Messages and Stack Traces
      • Write-ups
Powered by GitBook
On this page

Was this helpful?

Overview

NextWrite Ups Compilations/Resources

Last updated 4 years ago

Was this helpful?

My motivation for writing this blog is to provide a learning resource that is oriented to the way I learn best which is to read a brief description to understand the vulnerability, view real world examples of the vulnerability being exploited and reviewing source code of applications to understand why the vulnerability exists then reading further resources. Thus this blog is organized in that structure. Each vulnerability contains a brief explanation with a source code example in JavaScript Node JS as well as an example of it being exploited. The next page will contain real world write-ups of the vulnerabilities being exploited with brief explanations of each. Source code examples are illustrated on the following page taken from vulnerable labs such as OWASP's Juice Shop. The full list of labs can be found in. Any further resources, tools and payloads will then be found in the two pages after that.

Note the general Labs page linked above contains general labs which contain numerous vulnerabilities, The labs page under each vulnerability section contains labs specifically for that vulnerability.

Follow me on twitter .

Labs
@EvanThomasLuke