Sec-88
search
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSecchevron-right
    • Industry Based Checklistchevron-right
    • Services Based Pentest Checklist
    • Features Abusechevron-right
    • Reconnaissancechevron-right
    • XSS-HTML Injectionchevron-right
    • Improper Authenticationchevron-right
    • OAUTH Misconfigurationschevron-right
    • Broken Access Controlchevron-right
    • Subdomain Enumeration
    • Fingerprinting
    • Dorking
    • Auth0 Misconfigurations
    • Broken Link Injection
    • Command Injection
    • CORS
    • CRLF
    • CSRF
    • Host Header Attacks
    • HTTP request smuggling
    • JSON Request Testing
    • LFIchevron-right
    • No Rate Limit
    • Parameters Manual Testing
    • Open Redirect
    • Registration & Takeover Bugs
    • Remote Code Execution (RCE)
    • Session Fixation
    • SQL Injectionchevron-right
    • SSRF
    • SSTI
    • Subdomain Takeover
    • Web Caching Vulnerabilities
    • WebSockets
    • XXEchevron-right
    • Cookie Based Attacks
    • CMSchevron-right
    • XSSI (Cross Site Script Inclusion)
    • NoSQL injection
    • Local VS Remote Session Fixation
    • Protectionchevron-right
    • Hacking IIS Applications
    • Dependency Confusion
    • Attacking Secondary Context
    • Hacking Web Sockets
    • IDN Homograph Attack
    • DNS Rebinding Attack
    • LLM Hacking Checklist
    • Bypass URL Filtration
    • Cross-Site Path Traversal (CSPT)
    • PostMessage Security
    • Prototype Pollutionchevron-right
    • Tools-Extensions-Bookmarks
    • WAF Bypassing Techniques
    • SSL/TLS Certificate Lifecycle
    • Serialization in .NET
    • Client-Side Attackschevron-right
      • JavaScript Analysis
    • Bug Bounty Platforms/Programs
    • DNS Dangling / NS Takeover
    • X-Correlation Injection
    • DoS - Exploiting WAF Request Size Limits
    • Next.js middleware CP - DOS
    • Cache Poisoning Test Plan for Next.js
    • Nuxt CP - DOS
    • Next.js Middleware Bypass
    • Exploiting Parser Flaws for Access Bypasses
    • Session Puzzling Attack
    • ASP.NET Security Testing
  • ✉️API-Secchevron-right
  • 📱Android-AppSecchevron-right
  • appleIOS-AppSecchevron-right
  • 📶Network-Secchevron-right
  • 💻Desktop AppSecchevron-right
  • ☁️Cloud Secchevron-right
  • 👨‍💻Programmingchevron-right
  • 🖥️Operating Systemschevron-right
  • ✍️Write-Upschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🕸️Web-AppSec

Client-Side Attacks

  • https://hackerone.com/reports/67386arrow-up-right

  • https://hackerone.com/reports/332708arrow-up-right

  • https://portswigger.net/web-security/dom-basedarrow-up-right

  • https://hackerone.com/bobrovarrow-up-right

  • https://github.com/BlackFan/content-type-researcharrow-up-right

  • https://github.com/BlackFan/client-side-prototype-pollutionarrow-up-right

PreviousSerialization in .NETchevron-leftNextJavaScript Analysischevron-right

Last updated 12 months ago