Sec-88
search
Ctrlk
  • 🧑Whoami
  • 🕸️Web-AppSecchevron-right
    • Industry Based Checklistchevron-right
    • Services Based Pentest Checklist
    • Features Abusechevron-right
    • Reconnaissancechevron-right
    • XSS-HTML Injectionchevron-right
    • Improper Authenticationchevron-right
    • OAUTH Misconfigurationschevron-right
    • Broken Access Controlchevron-right
    • Subdomain Enumeration
    • Fingerprinting
    • Dorking
    • Auth0 Misconfigurations
    • Broken Link Injection
    • Command Injection
    • CORS
    • CRLF
    • CSRF
    • Host Header Attacks
    • HTTP request smuggling
    • JSON Request Testing
    • LFIchevron-right
    • No Rate Limit
    • Parameters Manual Testing
    • Open Redirect
    • Registration & Takeover Bugs
    • Remote Code Execution (RCE)
    • Session Fixation
    • SQL Injectionchevron-right
    • SSRF
    • SSTI
    • Subdomain Takeover
    • Web Caching Vulnerabilities
    • WebSockets
    • XXEchevron-right
    • Cookie Based Attacks
    • CMSchevron-right
    • XSSI (Cross Site Script Inclusion)
    • NoSQL injection
    • Local VS Remote Session Fixation
    • Protectionchevron-right
      • Security Mechanisms for Websites
      • Cookie Flags
      • SameSite Cookie Restrictions
      • Same-origin policy (SOP)
      • CSP
    • Hacking IIS Applications
    • Dependency Confusion
    • Attacking Secondary Context
    • Hacking Web Sockets
    • IDN Homograph Attack
    • DNS Rebinding Attack
    • LLM Hacking Checklist
    • Bypass URL Filtration
    • Cross-Site Path Traversal (CSPT)
    • PostMessage Security
    • Prototype Pollutionchevron-right
    • Tools-Extensions-Bookmarks
    • WAF Bypassing Techniques
    • SSL/TLS Certificate Lifecycle
    • Serialization in .NET
    • Client-Side Attackschevron-right
    • Bug Bounty Platforms/Programs
    • DNS Dangling / NS Takeover
    • X-Correlation Injection
    • DoS - Exploiting WAF Request Size Limits
    • Next.js middleware CP - DOS
    • Cache Poisoning Test Plan for Next.js
    • Nuxt CP - DOS
    • Next.js Middleware Bypass
    • Exploiting Parser Flaws for Access Bypasses
    • Session Puzzling Attack
    • ASP.NET Security Testing
  • ✉️API-Secchevron-right
  • 📱Android-AppSecchevron-right
  • appleIOS-AppSecchevron-right
  • 📶Network-Secchevron-right
  • 💻Desktop AppSecchevron-right
  • ☁️Cloud Secchevron-right
  • 👨‍💻Programmingchevron-right
  • 🖥️Operating Systemschevron-right
  • ✍️Write-Upschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🕸️Web-AppSec

Protection

Security Mechanisms for Websiteschevron-rightCookie Flagschevron-rightSameSite Cookie Restrictionschevron-rightSame-origin policy (SOP)chevron-rightCSPchevron-right
PreviousLocal VS Remote Session Fixationchevron-leftNextSecurity Mechanisms for Websiteschevron-right