Post

CWES Cheatsheet

this is my personal cheatsheet collection for the Certified Web Exploitation Specialist (CWES) cert. i’m sharing the structure and tools i used while studying, not to hand you answers, but hopefully to inspire you to build your own.

go through the topics, pick up the tools, and make your own notes. that’s how it actually sticks.


Topics

Attack VectorTools / CommandsKey Topics
Passive Reconhost, wafw00f, whois, google dork, waybackPublic info, subdomain recon, infrastructure ID
Active Reconnslookup, dnsrecon, dnsenum, dig, fierceSubdomain enum, VHOST, zone transfers, DNS
Fuzzingffuf, Gobuster, Wenum, FeroxbusterDir/page/extension/param/API fuzzing
XSSXSStrike, Brute XSS, XSSerStored, Reflected, DOM-based
SQL InjectionSQLMap, manual SQLSQLi fundamentals, SQLMap essentials
Command InjectionBlacklist filtersFilter bypass techniques
File UploadClient-side/blacklist/whitelist/content-type bypassUpload filter bypasses
File InclusionLFI, PHPWrapperLFI, PHP wrappers
Server-Side AttacksSSRF, SSTI, SSI, XSLTServer-side injection techniques
Login Brute ForcingHydra, hashcatBrute force, password cracking
Broken AuthenticationAuth bypass techniques
Web AttacksHTTP Verb Tamper, IDOR, XXEVerb tampering, IDOR, XXE
Attacking GraphQLGraphQLEnumeration, exploitation
API AttacksRESTREST API attack techniques
Attacking Common ApplicationsCommon app exploitation
JavaScript DeobfuscationJS deobfuscation techniques
This post is licensed under CC BY 4.0 by the author.