⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • Home
    • WHOAMI
  • Network Pentest
    • Recon
    • Enumeration
    • Exploitation
      • Application Exploitation
      • Binary Explotation
      • Service Exlpoitation
      • Web Exploitation
        • Accounts and sessions
        • Configuration
          • Default credentials
          • Denial of Service (DoS)
          • HTTP methods
          • HTTP request smuggling
          • HTTP response splitting
          • Identity and Access Management
          • Insecure Cookies
          • HTTP security headers
            • Clickjacking
            • CORS (Cross-Origin Resource Sharing)
            • CSP (Content Security Policy)
            • MIME type sniffing
        • Reconnaissance
        • User inputs
    • Pre Exploitation
    • Post-Exploitation
    • Privilege Escalation
    • Active Directory Attack
  • Courses
    • HTB-CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Network Pentestchevron-right
  2. Exploitationchevron-right
  3. Web Exploitationchevron-right
  4. Configuration

HTTP security headers

Clickjackingchevron-rightCORS (Cross-Origin Resource Sharing)chevron-rightCSP (Content Security Policy)chevron-rightMIME type sniffingchevron-right
PreviousInsecure Cookieschevron-leftNextClickjackingchevron-right

Last updated 10 months ago