🚩
Practical CTF
search
Ctrlk
BlogContact
  • 🚩Home - Practical CTF
  • 🌐Web
    • Enumerationchevron-right
    • Client-Sidechevron-right
    • Server-Sidechevron-right
      • SQL Injection
      • NoSQL Injection
      • GraphQL
      • XML External Entities (XXE)
      • HTTP Request Smuggling
      • Local File Disclosure
      • Arbitrary File Write
      • Reverse Proxies
      • ImageMagick
    • Frameworkschevron-right
  • πŸ”£Cryptography
    • Encodings
    • Ciphers
    • AES
    • Asymmetric Encryptionchevron-right
    • Pseudo-Random Number Generators (PRNG)
    • Hashingchevron-right
    • XOR
    • Custom Cipherschevron-right
    • Timing Attacks
    • Blockchainchevron-right
  • πŸ”ŽForensics
    • Wireshark
    • File Formats
    • Archives
    • Memory Dumps (Volatility)
    • VBA Macros
    • Grep
    • Git
    • File Recovery
  • βš™οΈReverse Engineering
    • Ghidra
    • Angr Solver
    • Reversing C# - .NET / Unity
    • PowerShell
  • πŸ“ŸBinary Exploitation
    • ir0nstone's Binary Exploitation Notesarrow-up-right-from-square
    • Reverse Engineering for Pwn
    • PwnTools
    • ret2win
    • ret2libc
    • Shellcode
    • Stack Canaries
    • Return-Oriented Programming (ROP)chevron-right
    • Sandboxes (chroot, seccomp & namespaces)
    • Race Conditions
  • πŸ“²Mobile
    • Setup
    • Reversing APKs
    • Patching APKs
    • HTTP(S) Proxy for Android
    • Frida
    • Android Backup
    • Compiling C for Android
    • iOS
  • 🌎Languages
    • Python
    • JavaScriptchevron-right
    • PHP
    • Java
    • C#
    • Assembly
    • Markdown
    • LaTeX
    • JSON
    • YAML
    • CodeQL
    • NASL (Nessus Plugins)
    • Regular Expressions (RegEx)
  • πŸ€–Networking
    • Modbus - TCP/502
    • Redis/Valkey - TCP/6379
  • 🐧Linux
    • Shells
    • Bash
    • Linux Privilege Escalationchevron-right
    • Analyzing Processes
  • πŸͺŸWindows
    • The Hacker Recipes - ADarrow-up-right-from-square
    • Scanning/Spraying
    • Exploitation
    • Local Enumeration
    • Local Privilege Escalation
    • Windows Authenticationchevron-right
    • Lateral Movement
    • Active Directory Privilege Escalation
    • Persistence
    • Antivirus Evasion
    • Metasploit
    • Alternate Data Streams (ADS)
  • ☁️Cloud
    • Kubernetes
    • Microsoft Azure
  • ❔Other
    • Business Logic Errors
    • Password Managers
    • ANSI Escape Codes
    • WSL Tips
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🌐Web

Server-Side

Attacks that have impact on the server, often by abusing dangerous functionality

SQL Injectionchevron-rightNoSQL Injectionchevron-rightGraphQLchevron-rightXML External Entities (XXE)chevron-rightHTTP Request Smugglingchevron-rightLocal File Disclosurechevron-rightArbitrary File Writechevron-rightReverse Proxieschevron-rightImageMagickchevron-right
PreviousHeadless Browserschevron-leftNextSQL Injectionchevron-right

Last updated 26 days ago