Category: Web Applications


How to detect and identify the type of Web Application Firewall (WAF)

Attacks targeting proxy servers

Monitoring the emergence of new subdomains in real time

How to run PHP script without a web server

Basics of working with a web server for a pentester

How to hack HTTP Basic and Digest Authentication

How to use User Agent to attack websites

Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 1)

How to exploit blind command injection vulnerability