Skip to main content

๐Ÿ—บ Security Theory Overview

Welcome to the Security Theory section. These notes are organized from the Niebezpiecznik cybersecurity training (March 2026) and cover OWASP-aligned attack categories.

How to use this sectionโ€‹

  • Each page covers one attack type or concept
  • Look for the ๐Ÿ’ก Easy to remember box on each page โ€” it's your quick recall hook
  • The TL;DR at the top gives you the 1-sentence summary

Topics coveredโ€‹

#TopicCategory
1Reconnaissance๐Ÿ”ต Recon
2IDOR๐Ÿ”ด Access Control
3Path Traversal๐Ÿ”ด Access Control
4Privilege Escalation๐Ÿ”ด Access Control
5Endpoint Discovery๐Ÿ”ต Recon
6Burp Suite (MITM proxy)๐ŸŸ  Tools
7TLS & Certificates๐ŸŸก Crypto
8Cookies & GDPR๐ŸŸก Crypto
9.git Exposure๐ŸŸก Crypto
10JWT๐ŸŸก Crypto
11HTTP Headers & Spoofing๐ŸŸฃ Headers
12CSRF๐ŸŸฃ Headers
13Cryptographic Failures๐ŸŸก Crypto
14DNS Security๐ŸŸค DNS
15IoT & Zero-day๐ŸŸค Infra
16Injection & XSS๐Ÿ”ด Injection