Web-HTML-iconHTTP/HTTPS interception

Information gathering

Review Vulnerabilities

“WordPress

Jenkins

TIKIWIKI

DVWA

Mutillidae

Information Gathering

Malicious File upload

Cross Domain

Input validation

Reverse shell

Fortinet web partal

CORS

CTF