Link Search Menu Expand Document

Approach:

There are a few fields controllable by the client:

  • Parameters in URL
  • Parameters in post body
  • HTTP Headers
  • HTTP Header contents

see also OWASP Attack Vector Analysis

Attack References

portswigger academy
OWASP vulnerabilitis OWASP attacks

Guide references

OWASP WSTG

Mitigation References

OWASP controls
OWASP Cheatsheets

moar references


Table of contents


40397ac9 (main) : 2023-01-11T20:40:16+01:00