Cylabs
Ctrlk
  • 😊Welcome to CyLabs
  • 101 Series
  • Introduction to Cyber Security Operations
  • Cyber Security Assessment
  • Cybersecurity Frameworks and Standards
  • Security Domains
    • Security Designing
    • Application Security
      • Cryptographic Attacks
      • Password Attacks
      • Web Application Security
        • Enumeration
        • Bruteforce Attack
        • Directory Traversal
        • Insecure Direct Object Reference (IDOR)
        • Session Hijacking
        • File Inclusion Attacks
        • Server-Side Request Forgery (SSRF)
        • Deserialization Attacks
        • Command Injection
        • Server Side Template Injection
        • Cross Site Scripting (XSS)
        • SQL Injection
        • Cross-Site Request Forgery (CSRF)
        • XML External Entity (XXE)
        • File Upload Vulnerabilites
        • Remote Code Execution (RCE)
        • Tools
      • OWASP TOP 10 API
      • OWASP Top 10 Mobile
      • OWASP Top 10 IOT
      • Web Application Security
      • Microservices
      • WPscan
      • Tools
    • Cloud Security
    • Identity and Access Management
    • Cloud Security
    • DevSecOps
    • Social Engineering
    • DevOps
    • Mobile Security
    • IOT/OT/SCADA
    • Network Security
    • Wireless Attacks
    • Purple Teaming
    • Kubernetes Security
    • Hardware Security
    • Container Security
    • AI
    • Reverse Engineering
  • Operational Security
  • Industry Specific Security:Case Studies
  • Computational Science
  • Data Engineering
  • AI/ML and Data Science
  • Application Development
  • Radom Topics :)
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Security Domains
  2. Application Security
  3. Web Application Security

Session Hijacking

PreviousInsecure Direct Object Reference (IDOR)NextFile Inclusion Attacks

Was this helpful?