Explore the process of tracing and countering an attack in this project, including identifying the attacker's tools, understanding the scan targets, and analyzi
This article details a penetration test conducted on a website's root domain. It highlights the discovery of ThinkPHP framework versions with known vulnerabilit
This article details the process of identifying and exploiting a high-risk vulnerability through privilege escalation on a community website. It covers the disc
This article details a penetration test conducted on the author's school system. Key steps include information gathering, login with default credentials, bypass