This article details an interesting experience of discovering a file upload vulnerability during an OA system penetration test. It covers the process from initi
Explore the common attack methods on GraphQL APIs and learn about securing your system with best practices. Discover how to protect against vulnerabilities in t
Explore advanced red team tactics for educational sectors focusing on JY and ZW industries. Learn about target selection, information gathering, privilege maint
This article discusses the process of penetration testing a school's internal network, including target selection, information collection, and asset mapping. Ke
Discover the steps to decrypt an app's encrypted data package and generate valid signatures using JavaScript. Learn about AES encryption with PKCS7 padding, sor
Learn how to use assembly code to create a reverse shell connection. This guide explains the process of locating kernel32.dll using PEB and executing shellcode
Discover advanced techniques for password extraction in post-exploitation scenarios on Windows systems. Learn methods like procdump, Wdigest, and comsvcs.dll to