Basics

Reconnaissance and Information gathering

Authentication and Authorization attacks

Injection Attacks