๐บ Security Theory Overview
Welcome to the Security Theory section. These notes are organized from the Niebezpiecznik cybersecurity training (March 2026) and cover OWASP-aligned attack categories.
How to use this sectionโ
- Each page covers one attack type or concept
- Look for the ๐ก Easy to remember box on each page โ it's your quick recall hook
- The TL;DR at the top gives you the 1-sentence summary
Topics coveredโ
| # | Topic | Category |
|---|---|---|
| 1 | Reconnaissance | ๐ต Recon |
| 2 | IDOR | ๐ด Access Control |
| 3 | Path Traversal | ๐ด Access Control |
| 4 | Privilege Escalation | ๐ด Access Control |
| 5 | Endpoint Discovery | ๐ต Recon |
| 6 | Burp Suite (MITM proxy) | ๐ Tools |
| 7 | TLS & Certificates | ๐ก Crypto |
| 8 | Cookies & GDPR | ๐ก Crypto |
| 9 | .git Exposure | ๐ก Crypto |
| 10 | JWT | ๐ก Crypto |
| 11 | HTTP Headers & Spoofing | ๐ฃ Headers |
| 12 | CSRF | ๐ฃ Headers |
| 13 | Cryptographic Failures | ๐ก Crypto |
| 14 | DNS Security | ๐ค DNS |
| 15 | IoT & Zero-day | ๐ค Infra |
| 16 | Injection & XSS | ๐ด Injection |