TCM SOC 101 - Notes
Part 1 - SOC Fundamentals Context: This section covers the foundational concepts of Security Operations Centers (SOCs). Understanding these basics is essential for anyone entering cybersecurity ope...
Part 1 - SOC Fundamentals Context: This section covers the foundational concepts of Security Operations Centers (SOCs). Understanding these basics is essential for anyone entering cybersecurity ope...
Understanding Access Control Vulnerabilities Access control vulnerabilities occur when a web application fails to enforce proper restrictions on user actions or resources. This enables attackers t...
Access Control Vulnerabilities Summary and Testing Guide What Are Access Control Vulnerabilities? Access control vulnerabilities occur when an application does not properly restrict users’ access ...
What is Information Disclosure? Information disclosure, also known as information leakage, occurs when a website unintentionally reveals sensitive information to its users. Depending on the contex...
When testing for path traversal vulnerabilities, look for every potential entry points. Path Traversal Testing Cheatsheet Check for endpoints with file operations (e.g., load, file, path, imag...
Bug Bounty Cheatsheet: Web Cache Deception This is a personal cheatsheet for testing potential Web Cache Deception vulnerabilities. Key Testing Tips Always verify caching behavior using X-C...
Understanding Path Traversal Vulnerabilities What is Path Traversal? Path traversal, also known as directory traversal, is a type of security vulnerability that allows attackers to access files a...
Business Logic Vulnerabilities: Comprehensive Testing Cheatsheet 1. General Testing Approach Understand Workflows: Analyze how key actions like registration, checkout, or access cont...
Business Logic Vulnerabilities: What, Why, and How What Are Business Logic Vulnerabilities? Business logic vulnerabilities are flaws in an application’s design or implementation that allow uninten...
Web Cache Deception Vulnerability and Exploitation What is it? A vulnerability that enables attackers to trick web caches and gain unauthorized access to sensitive information. It is caused by inc...