Explore the technical details of a CTF challenge that involved exploiting fastcgi through a 302 redirect. This article covers the steps and techniques used to b
Explore Spring Boot security vulnerabilities, including SpEL injection in Spring Cloud Function. Learn about actuator mappings, heapdump exploitation techniques
Explore the process of reverse engineering a financial mini program's data encryption and signature verification. Learn about the steps involved in decrypting s
This article analyzes a critical file upload vulnerability in an order system that bypasses multiple layers of authentication. It covers the investigation into
This article discusses the process of reversing a financial mini program's data encryption and signature verification mechanism. It covers key steps such as ide