Introduction To Penetration-List
Hello Everyone, Today I’ll describe my project which is Penetration-list, that is why I’m making this article and we’ll learn many vulnerabilities on this. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, an Information Security Researcher, and the founder of Albus Security.
So, The reason to make this is that I just want one list that contains a theory section with steps to find a single vulnerability. So for the theory section, I’ve decided that I’ll make articles on medium on that articles we’ll discuss vulnerabilities in very depth, Mean We’ll go zero to hero level about vulnerability, Then about materials that we use to find a vulnerability like Payload, Malicious files, fuzzing lists, dorks lists and Malicious scripts that were used to find a vulnerability in your Target. So for the material part, I’ll upload files to the GitHub repository:-
Now, how many vulnerabilities We will learn about in Penetration-list?
- Information Disclosure — 01
- File-Upload Vulnerability — 02
- Open-Redirection — 03
- File-Inclusion — 04
- Cross-Site-Scripting (XSS) — 05
- SQL Injection — 06
- Command-Injection — 07
- Server-Side-Request-Forgery (SSRF) — 08
- Client-Side-Request-Forgery (CSRF) — 09
- Cross-Origin-Resource-Sharing(CORS) Misconfiguration — 10
- Html Injection — 11
- API Vulnerabilities — 12
- GraphQL Injection — 13
- Log4shell Vulnerability — 14
- Extra vulnerabilities like Long password Attacks, Malicious Cache purge requests, OTP Bypass, Rate-Limit Bypass,403 Bypass, Recaptcha Bypass, etc
However, I’ll add more Vulnerabilities like the ms10–070, S3 bucket misconfiguration, heartbleed, and Joomla vulnerabilities, But first I’ll complete these topics then I’ll add them in the future. And I hope you liked our previous articles about File-upload, XSS, File inclusion, open redirection, and Information disclosure. There I’ll make more article as soon as possible. But The most important thing that I’ll be focusing on is the quality of articles, not quantity. And we need your support because your support will motivate us to grow more. In penetration-List, there are only two people who work on the penetration-List Project. therefore I’ll introduce my partner, Prakrati. However, I’ll make an article then I’ll give it to her. So, She will rewrite that article which means she’ll find errors in articles to give you the best quality. I think it’s enough for an introduction to the Penetration-list project. Thanking you team albus security.