How the web works, HTTP/HTTPS, browsers, servers, DNS.
TCP/IP, ports, protocols, proxies, VPNs.
Forms, inputs, DOM structure, client-side rendering.
DOM manipulation, events, AJAX, fetch API.
APIs, sessions, cookies, authentication, authorization.
SQL, NoSQL, queries, injections, data storage.
SQL Injection, Command Injection, NoSQL Injection.
Stored, reflected, DOM XSS, CSRF attacks.
Broken auth, IDOR, session fixation, brute force.
File upload bypass, LFI/RFI, business logic flaws.
Burp Suite, OWASP ZAP, SQLmap, Nmap.
Intercepting requests, payload crafting, fuzzing.
TryHackMe, PortSwigger Labs, HackTheBox.
Finding and reporting real-world web vulnerabilities.