⚕️
Stuff
search
⌘Ctrlk
⚕️
Stuff
  • 🤝Greetings
  • 📘CTF writeups
    • TryHackMe
    • HackTheBox
    • SKR
    • 3108 CTF
    • EQCTF
    • UMCS CTF
    • BBCTF
  • 🕸️PortSwigger (Web Academy)
    • Prototype Pollution
      • Introduction
      • Client-Side Prototype Pollution
        • Lab 1
        • Lab 2
        • Lab 3
        • Constructor
        • Bypassing Weak Key Sanitization
      • Prototype Pollution via API
      • Server-Side Prototype Pollution
    • JWT
    • XSS
  • 📱Mobile Hacking Lab
    • Strings
  • ☠️Binary Exploitation
    • Stack
    • GDB Plugins
    • pwntools
  • 📰Cheatsheets & Article links
    • All Rounder
    • Web
    • Reverse Engineering
    • Active Directory
    • Linux
    • Binary Exploitation
    • Forensics
    • Intigriti-Monthly-Challenges
    • Miscellaneous / General
  • 🖼️LEKIR Framework writeups
    • Backdoor Exploiting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 🕸️PortSwigger (Web Academy)chevron-right
  2. Prototype Pollution

Client-Side Prototype Pollution

Lab 1chevron-rightLab 2chevron-rightLab 3chevron-rightConstructorchevron-rightBypassing Weak Key Sanitizationchevron-right
Previous3 Key Components for Exploitationchevron-leftNextLab 1chevron-right