Web Applications

Widest attack surface and deepest section of this playbook. Organized by category rather than alphabetically because the categories reflect how you actually think about testing. You test authentication as a system, not individual bugs in isolation.

Authentication

How users prove who they are. Every auth implementation is custom in ways that matter.

Authorization

How the app decides what you're allowed to do. Most consistently rewarded bug class in my experience.

Injection

Putting data where the application expects instructions.

SSRF

Making the server send requests on your behalf. Gateway to cloud metadata and internal networks.

  • SSRF - Full methodology, bypass techniques, blind SSRF, cloud exploitation

Client-Side

Bugs that execute in the user's browser.

Business Logic

The bugs no scanner will ever find.

Infrastructure

Server and proxy layer misconfigurations.

8 items under this folder.