External Recon
https://book.hacktricks.xyz/external-recon-methodology
Read More
External Infrastructure
Research notes and findings.
Read More
Exploiting Permissive Cors Headers
Add "Origin" header to request to determine how the endpoint reacts to CORS policy.
Read More
Exploitation (Java)
Although we have not discussed Java deserialization vulnerabilities in this course, it is worth mentioning that one such vulnerability exists in the ManageEngine Applications Manager instance in yo...
Read More
Exam Revision
+ Region - physical location in the world with two or more AZ
Read More
Enumerating Client Side JavaScript in Web Application Tests
=========================================================================================
Read More