indexWeb Security#cybersecurity#web-security#index

Web Security Index

Purpose

This index is the root entry point for the web-security branch of the cybersecurity vault.

Use it to: - navigate the web-security notes - understand the order of study - connect networking concepts to application-layer vulnerabilities - expand into API security, attack surface mapping, and playbooks

Use Reference Registry — Web Security as the source of truth for references in this branch. Return to Cybersecurity Index for root navigation across branches.

Before this branch: - Foundations (Phase 0). - TCP/IP basics, HTTP overview, HTTP headers, Cookies and sessions, TLS/HTTPS.


Phase 1 — Core mental models

  1. owasp-top-10
  2. broken-access-control
  3. idor
  4. auth-flaws
  5. mfa-phishing-resistance
  6. session-management

Phase 2 — Input and client-side attacks

  1. sql-injection
  2. xss
  3. csrf
  4. path-traversal
  5. command-injection
  6. xxe

Phase 3 — Server-side and proxy-aware attacks

  1. ssrf
  2. request-smuggling
  3. evilginx-and-reverse-proxy-phishing
  4. business-logic-vulnerabilities
  5. open-redirect
  6. oauth-security

Phase 4 — Supporting context

  1. cors-misconfiguration
  2. file-upload-abuse
  3. deserialization
  4. content-security-policy
  5. clickjacking
  6. bot-detection-signals

Core web-security cluster

Foundations

Input and client-side exploitation

Server-side exploitation

Browser and policy behavior



Suggested future notes

Next atomic notes

  • secure-headers
  • html-injection
  • http-trace-method
  • hidden-parameters
  • bug-bounty-reporting

Connected playbooks


References

  • Foundational: OWASP Top 10 — https://owasp.org/www-project-top-ten/
  • Foundational: OWASP WSTG Latest — https://owasp.org/www-project-web-security-testing-guide/latest/
  • Testing / Lab: PortSwigger Web Security Academy — https://portswigger.net/web-security