This article details a code audit and vulnerability discovery process during a penetration test. It highlights the identification of password reset vulnerabilit
This article details a red team operation targeting a small company with no official website or recruitment information. The author shares tactics such as phish
This article documents the vulnerability hunting process of a certain first-class university's platform. Key findings include an arbitrary file read exploit and
Explore the process of tracing and countering an attack in this project, including identifying the attacker's tools, understanding the scan targets, and analyzi