This article details an internal network penetration test using Spring Cloud and YSOSerial for exploiting vulnerabilities. It covers FTP anonymous login, servic
This article explores multiple high and medium risk vulnerabilities found on an e-commerce platform, including arbitrary user registration, infinite SMS verific
Explore a comprehensive penetration test scenario targeting a multi-layered internal network environment. This article details the process from external to inte
Explore the latest research on cloud lateral movement techniques in major cloud service providers like AWS, GCP. Understand how threat actors use IAM and APIs f
This article provides a detailed guide on how to perform penetration testing on WeChat mini programs using Burp Suite and Nightly Emulator. Learn about setting
Explore the Docker unauthorized access vulnerability and learn how attackers can exploit it through open 2375 ports. Understand the risks and prevention methods
Discover how cloud host secret keys (AK/SK) can be leaked through various scenarios such as heapdump files and JavaScript files. Learn practical exploitation te