cs-school
Home
Contact Us
Cloud
Cryptography
CTF
Exploitation
Forensics
Linux
Networking
Programming
Web
Windows
Other
Concepts
Cross origin resource sharing - CORS
Same origin policy - SOP
Vulnerabilities
Broken Access Control
Cross Site Scripting
Reflected XSS
Stored XSS
Dom-based XSS
Blind XSS
File upload
Path Traversal
Server-side Request Forgery
SQL Injection
In-band sqli
Inferential sqli
Out-of-band sqli
Second order sqli
Practice
Portswigger academy
SQL injection
01 - Retrieval of hidden data
02 - Login bypass
03 - Querying the database
04 - Query type,version of database
05 - Database-contents,non-oracle
06 - Listing the database contents on oracle
07 - Determining the number of columns
08 - Finding a column containing text
09 - Retrieving data from other tables
10 - Retrieving multiple values in a single column
11 - Blind SQL injection with conditional responses
12 - Blind SQL injection with conditional errors
13 - Visible error-based SQL injection
14 - Blind SQL injection with time delays
15 - Blind SQL injection with time delays and information retrieval
18 - SQL injection with filter bypass via XML encoding
Cross Site Scripting
01 - Reflected XSS into HTML context with nothing encoded
02 - Stored XSS into HTML context with nothing encoded
03 - DOM XSS in document.write sink using source location.search
04 - DOM XSS in innerHTML sink using source location.search
05 - DOM XSS in jQuery anchor href attribute sink using location.search source
06 - DOM XSS in jQuery selector sink using a hashchange event
07 - Reflected XSS into attribute with angle brackets HTML-encoded
Practice page
Prev
CAPA: The Basics
01/02/25
ctf → thm → capa-the-basics
SQLMap: The Basics
31/01/25
ctf → thm → sqlmap-the-basics
SQL Fundamentals
31/01/25
ctf → thm → sql-fundamentals
Powershell
30/01/25
programming → powershell
Your Feedback
Name
Email
Message
Send Feedback
Follow us on X (formerly Twitter)
Join us on Discord
Follow us on Telegram
© 2024 cyberuniversity.tech. All rights reserved.
Term of service,
Privacy Policy