This article details an interesting traceback process during a cybersecurity exercise. It reveals the discovery and analysis of a phishing attack through GitHub
This article details a penetration test conducted on a vendor's demo site. The author discovered several vulnerabilities including SQL injection and successfull
This article details an emergency response conducted through a post-backend approach. It covers the process of identifying and analyzing web backdoors, logging,
This article details a simple penetration test on the www.target.net platform. It covers information gathering, file upload vulnerabilities, SQL injection, and