This article details a comprehensive Java code audit of a backend system using SpringBoot + Mybatis. It highlights vulnerabilities such as Shiro deserialization
This article details a penetration test on an enterprise, focusing on identifying vulnerabilities through SQL injection and achieving system control by escalati
Discover the DCShadow attack technique and how it allows malicious attackers to maintain domain privileges by creating a fake domain controller. Learn about its
Learn how to bypass rate limiting mechanisms by disabling the recaptcha header and exploiting a security token endpoint. Discover the techniques used and earn a
This article discusses methods for handling login interfaces where password fields are encrypted. It covers techniques such as importing and executing JS locall