🚩
Practical CTF
Ctrlk
BlogContact
  • 🚩Home - Practical CTF
  • 🌐Web
    • Enumeration
    • Client-Side
    • Server-Side
      • SQL Injection
      • NoSQL Injection
      • GraphQL
      • XML External Entities (XXE)
      • HTTP Request Smuggling
      • Local File Disclosure
      • Arbitrary File Write
      • Reverse Proxies
      • ImageMagick
    • Frameworks
  • πŸ”£Cryptography
    • Encodings
    • Ciphers
    • AES
    • Asymmetric Encryption
    • Pseudo-Random Number Generators (PRNG)
    • Hashing
    • XOR
    • Custom Ciphers
    • Timing Attacks
    • Blockchain
  • πŸ”ŽForensics
    • Wireshark
    • File Formats
    • Archives
    • Memory Dumps (Volatility)
    • VBA Macros
    • Grep
    • Git
    • File Recovery
  • βš™οΈReverse Engineering
    • Ghidra
    • Angr Solver
    • Reversing C# - .NET / Unity
    • PowerShell
  • πŸ“ŸBinary Exploitation
    • ir0nstone's Binary Exploitation Notes
    • Reverse Engineering for Pwn
    • PwnTools
    • ret2win
    • ret2libc
    • Shellcode
    • Stack Canaries
    • Return-Oriented Programming (ROP)
    • Sandboxes (chroot, seccomp & namespaces)
    • Race Conditions
  • πŸ“²Mobile
    • Setup
    • Reversing APKs
    • Patching APKs
    • HTTP(S) Proxy for Android
    • Frida
    • Android Backup
    • Compiling C for Android
    • iOS
  • 🌎Languages
    • Python
    • JavaScript
    • PHP
    • Java
    • C#
    • Assembly
    • Markdown
    • LaTeX
    • JSON
    • YAML
    • CodeQL
    • NASL (Nessus Plugins)
    • Regular Expressions (RegEx)
  • πŸ€–Networking
    • Modbus - TCP/502
    • Redis/Valkey - TCP/6379
  • 🐧Linux
    • Shells
    • Bash
    • Linux Privilege Escalation
    • Analyzing Processes
  • πŸͺŸWindows
    • The Hacker Recipes - AD
    • Scanning/Spraying
    • Exploitation
    • Local Enumeration
    • Local Privilege Escalation
    • Windows Authentication
    • Lateral Movement
    • Active Directory Privilege Escalation
    • Persistence
    • Antivirus Evasion
    • Metasploit
    • Alternate Data Streams (ADS)
  • ☁️Cloud
    • Kubernetes
    • Microsoft Azure
  • ❔Other
    • Business Logic Errors
    • Password Managers
    • ANSI Escape Codes
    • WSL Tips
Powered by GitBook
On this page
  1. 🌐Web

Server-Side

Attacks that have impact on the server, often by abusing dangerous functionality

SQL InjectionNoSQL InjectionGraphQLXML External Entities (XXE)HTTP Request SmugglingLocal File DisclosureArbitrary File WriteReverse ProxiesImageMagick
PreviousHeadless BrowsersNextSQL Injection

Last updated 5 days ago