Security / Protocol Manipulation
Understanding the common ways in which protocols can be manipulated to open up security holes and allow for bad actors to obtain access to data, content, algorithms and other resources behind services.
Notes: |
Comment Injection Attack | ||
Custom Special Character Injection | ||
Double Encoding | ||
Forced Browsing | ||
Path Traversal | ||
Relative Path Traversal | ||
Repudiation Attack | ||
Setting Manipulation | ||
Unicode Encoding |
|
|
|