Discover the critical vulnerabilities of supply chains and explore advanced techniques such as heapdump leaks and unauthorized access in WeChat Mini Programs. L
Learn how to exploit JavaScript for intranet horizontal privilege escalation during a cybersecurity exercise. This guide covers techniques such as SQL injection
This article discusses a vulnerability test conducted on a school’s award submission platform. It covers issues such as privilege escalation, file upload and do
This article details an internal network penetration test using Spring Cloud and YSOSerial for exploiting vulnerabilities. It covers FTP anonymous login, servic
Discover how a researcher exploited Tesla's dual IDP system to perform an account takeover. Learn about the implications of using former employees' emails for u
This article documents a simple penetration test on the www.target.net platform. It covers the process of information collection, discovering vulnerabilities su
This article describes the process of discovering vulnerabilities through a sensitive information leak. Key steps include using JSFinder to identify accounts an