#1
✅ Attempting to manipulate SQL queries through input fields to gain unauthorized access to the database.
✅ Injecting malicious scripts into input fields to execute code in other users' browsers.
✅ Cross-site request forgery (CSRF): Craft requests that execute actions on behalf of authenticated users without their consent.
✅ Broken authentication: Check for weak password policies, session pinning and other authentication vulnerabilities.
✅ Identify and exploit misconfigured server configurations, directory permissions and default credentials.
✅ Attempting to access sensitive information, such as user credentials or personal data, by exploiting vulnerabilities.
✅ Exploiting XML input parsing to reveal internal files or execute malicious actions.
✅ Manipulating serialized data to execute arbitrary code or perform unauthorized actions.
✅ IDOR: Attempting to access unauthorized resources or data by manipulating object references.
✅ SSRF: Sending crafted requests to access internal resources or perform actions on the server.
✅ File upload: Uploading malicious files to gain unauthorized access, execute code or escalate privileges.

[Image: pepeglad.png]