Explore the security vulnerability of an electric arcade app's WeChat one-click login feature. Discover how to exploit it by accessing shared preferences and ex
Explore common login logic vulnerabilities such as weak passwords, brute force attacks, and CAPTCHA bypass. Discover practical solutions to enhance web applicat
Explore the unusual 403 bypass technique used in a recent penetration test on redacted.com. Learn how changing case sensitivity led to gaining access to the adm
This article discusses the audit of vulnerabilities in a mini Taobao platform built with Spring Boot. It focuses on identifying issues related to Fastjson comma
This article discusses a vulnerability test conducted on a school’s award submission platform. It covers issues such as privilege escalation, file upload and do
Explore four real-life vulnerability discovery cases including storage process SQL injection and SSRF. Learn practical techniques for identifying and exploiting