Portswigger Academy is my go-to Platform to study and practice Web vulnerabilities. Out of every content available, the fact that it’s free is absolutely outstanding for the amount of resources it provides. Each lab write-up are available below with a note associated with the vulnerability.

/admin/delete?username=carlos Appreciation post

Server-side vulnerabilities

SQL injection


Server-side Request Forgery


I have been working on SSRF while studying Cloud environments. The potential risk of reaching internal resources is particularly high in these environments. Multiple labs are available to practice exploiting this vulnerability.

XML external entity (XXE) injection


LabStatusRedaction
exploiting xxe to perform ssrf attacks

Solved

Published

Oauth authentication


HTTP Host header attacks


LabStatusRedaction
routing-based ssrf

Solved

Published
ssrf via flawed request parsing

Solved

Published

Client-side vulnerabilities

WebSockets


DOM-based vulnerabilities


LabStatusRedaction
dom based open redirection

Solved

Published

Cross-site request forgery (CSRF)


Cross-site scripting


LabStatusRedaction
reflected xss into html context with nothing encoded

Solved

Published
stored xss into html context with nothing encoded

Solved

Published
dom xss in documentwrite sink using source locationsearch

Solved

Published
dom xss in innerhtml sink using source locationsearch

Solved

Published
dom xss in jquery anchor href attribute sink using locationsearch source

Solved

Published
dom xss in jquery selector sink using a hashchange event

Solved

Published
reflected xss into attribute with angle brackets html encoded

Unsolved

Unpublished
stored xss into anchor href attribute with double quotes html encoded

Unsolved

Unpublished
reflected xss into a javascript string with angle brackets html encoded

Unsolved

Unpublished
dom xss in documentwrite sink using source locationsearch inside a select element

Solved

Published
dom xss in angularjs expression with angle brackets and double quotes html encoded

Unsolved

Unpublished
reflected dom xss

Unsolved

Unpublished
stored dom xss

Unsolved

Unpublished
reflected xss into html context with most tags and attributes blocked

Unsolved

Unpublished
reflected xss into html context with all tags blocked except custom ones

Unsolved

Unpublished
reflected xss with some svg markup allowed

Unsolved

Unpublished
reflected xss in canonical link tag

Unsolved

Unpublished
reflected xss into a javascript string with single quote and backslash escaped

Unsolved

Unpublished
reflected xss into a javascript string with angle brackets and double quotes html encoded and single quotes escaped

Unsolved

Unpublished
stored xss into onclick event with angle brackets and double quotes html encoded and single quotes and backslash escaped

Unsolved

Unpublished
reflected xss into a template literal with angle brackets single double quotes backslash and backticks unicode escaped

Unsolved

Unpublished
exploiting cross site scripting to steal cookies

Unsolved

Unpublished
exploiting cross site scripting to capture passwords

Unsolved

Unpublished
exploiting xss to bypass csrf defenses

Solved

Unpublished
reflected xss with angularjs sandbox escape without strings

Unsolved

Unpublished
reflected xss with angularjs sandbox escape and csp

Unsolved

Unpublished
reflected xss with event handlers and href attributes blocked

Unsolved

Unpublished
reflected xss in a javascript url with some characters blocked

Unsolved

Unpublished
reflected xss protected by very strict csp with dangling markup attack

Unsolved

Unpublished
reflected xss protected by csp with csp bypass

Unsolved

Unpublished