🥷
Red
CtrlK
  • 🟥Overview
  • 📚Education
  • Setup
  • ⭕Attacker Lifecycle
    • Steps
  • Bug Bounty
    • Bug Bounty Sites
    • OWASP Top 10
      • Injection
      • Broken Authentication
      • Sensitive Data Exposure
      • XML External Entities (XXE)
      • Broken Access Control
      • Security Misconfigurations
      • Cross-Site Scripting (XSS)
      • Insecure Deserialization
      • Using Components with Known Vulnerabilities
      • Insufficient Logging and Monitoring
Powered by GitBook
On this page
  1. Bug Bounty

OWASP Top 10

InjectionBroken AuthenticationSensitive Data ExposureXML External Entities (XXE)Broken Access ControlSecurity MisconfigurationsCross-Site Scripting (XSS)Insecure DeserializationUsing Components with Known VulnerabilitiesInsufficient Logging and Monitoring
PreviousBug Bounty SitesNextInjection

Last updated 2 years ago