Skip to main content

Exploitation Techniques

  • Buffer Overflow: Overwriting memory buffers to execute malicious code.
  • SQL Injection: Injecting malicious SQL code to access sensitive data.
  • Cross-Site Scripting (XSS): Injecting malicious code into web pages.
  • Cross-Site Request Forgery (CSRF): Tricking users into performing unintended actions.
  • Remote Code Execution (RCE): Executing malicious code remotely.
  • Local File Inclusion (LFI): Accessing sensitive files on a server.
  • Directory Traversal: Accessing files outside intended directories.