This article details a complex security breach involving multiple stages of attack including SSO weak passwords, source code leaks, and SQL injection. Discover
Explore comprehensive strategies and tools used by red teams to attack large-scale assets. Learn about effective asset collection methods, advanced vulnerabilit
Explore the detailed process of a unique pen test on TryHackMe’s Holo靶场,covering port scanning, vulnerability enumeration, privilege escalation techniques and m
Learn about the 'MalDoc in PDF' technique where attackers embed malicious Word documents within seemingly harmless PDFs. Discover how this method bypasses tradi
This article describes a detailed process of a penetration test on an educational website, covering weak password login, file upload vulnerabilities, SQL inject
Explore the techniques for exploiting coupon vulnerabilities in e-commerce systems, including coupon ID traversal, concurrent issuance, and more. Understand how
This article details a penetration test from Linux to domain control. It covers techniques such as LDAP authentication, DCSYNC privilege escalation, and cloud d