Exploitation Index¶ 01 - Authentication 02 - Access Control 03 - File Inclusion 04 - Server Side Request Forgery