Skip to content
This repository has been archived by the owner on Mar 26, 2024. It is now read-only.

Latest commit

 

History

History
33 lines (27 loc) · 2.02 KB

README.md

File metadata and controls

33 lines (27 loc) · 2.02 KB

Essential Web Vulnerabilities

< Back to Getting Started

All the vulnerabilities listed below are essential to know when it comes to web security. These vulnerabilities are the most common and are the most likely to be exploited. It is important to know how to prevent these vulnerabilities from being exploited and how to fix them if they are exploited.

⚠️ Warning: The exploration and handling of web vulnerabilities must comply with legal and ethical standards. Always ensure you have the necessary permissions and understand the implications of probing and testing vulnerabilities in any system or network. Unauthorized testing or exploitation of vulnerabilities can lead to legal consequences and ethical breaches. ⚠️

Bonus Vulnerabilities

  • HTTP Utilize Wireshark for sniffing passwords, usernames, and other sensitive data.
  • Lack of Rate Limiting (DDoS) Potentially looping through the site with multiple computers or renting servers to crash the site.
  • No Logging Absence of event logging, making malicious activities difficult to trace.
  • Execution of Malicious Files Running harmful files, potentially affecting the system or network.
  • Metadata Not Removed For example, not removing geolocation data from profile pictures.