Support

  • Why OpSecX
  • Customer Support
OpSecX Navigation

OpSecX

Online Security Education Platform

Home

Shopping Cart

  • $0.00 0 items

Main Menu

  • Online Security Courses
    • View All Courses
    • Automated Mobile Application Security Assessment with MobSF
    • Android Security Tools Expert
    • XSSing JavaScript-MVC Applications
    • Cross Site Scripting (XSS) Attacks for Pentesters
    • Node.js Security: Pentesting and Exploitation
    • WebSecNinja: Lesser Known WebAttacks
    • Windows Exploit Development Megaprimer
    • Mobile Security Bundle
    • Web Security Bundle
  • Services
    • Application Security Services
    • Live Training
      • WebSecNinja 2.0 Live Edition
      • AndroSecNinja Live Edition
      • Mobile Security Framework Live Edition
      • Pentesting modern day application technology stack
  • Resources
    • Blog
    • Security Books
  • My Account
    • Log In
Return to Content

RFD Attack Explained

Please purchase the course before starting the lesson.

Reflected File Download (RFD) Theory
Abusing JavaScript’s window.opener property Theory
Back to: WebSecNinja: Lesser Known WebAttacks – WSN > Reflected File Download (RFD)

WebSecNinja: Lesser Known WebAttacks – WSN

  • Previous
  • Next
  • Introduction to the Course

  • Introduction
  • RCE Attacks and Techniques

  • Remote Command or OS Command Injection Basics
  • Blind RCE Injection
  • RCE Techniques and Cheat Sheet
  • Bypassing RCE Filter
  • JSON Hijacking

  • JSON Hijacking Basics
  • JSON Hijacking Demo
  • Lesser Known XSS Variants

  • mXSS or mutation XSS
  • rPO XSS or Relative Path Overwrite XSS
  • Server Side Includes Injection (SSI Injection)

  • Server Side Includes Injection Basics
  • Server Side Includes Injection Demo
  • Server Side Request Forgery (SSRF)

  • Server Side Request Forgery Basics
  • Exploiting an SSRF Vulnerability
  • Reflected File Download (RFD)

  • Reflected File Download (RFD) Theory
  • RFD Attack Explained
  • Abusing Window.Opener Property

  • Abusing JavaScript's window.opener property Theory
  • Phishing by abusing window.opener property
  • Same Origin Method Execution (SOME)

  • Same Origin Method Execution Introduction
  • Same Origin Policy (SOP)
  • SOME Attack with Flash Callback explained
  • SOME Attack with Flash Callback Demo
  • Course Materials

  • Course Slides
  • Source Code

Copyright © 2024. All Rights Reserved.

OpSecX. | An OpenSecurity Initiative

Privacy Policy | Terms and Conditions | Customer Support | Security