This article details a penetration test exercise targeting a foreign website's Weblogic server and subsequent domain control machine. It covers initial reconnai
Discover effective techniques for information gathering during penetration testing. This article shares a detailed process with real case studies, including dir
Discover the value of subdomain fuzzing with a real-world example that led to a $35k bounty. Learn about Auth Bypass, RCE and SQLI techniques in this detailed c
Discover the detailed process of a penetration test against a car manufacturer during an advanced cybersecurity competition. Learn about information collection
Learn how a recent 5500 USD bounty reward was achieved by bypassing 2FA in a payment application. Discover the steps to edit user details without 2FA access and