This article details an injection attack targeting a greedy website, highlighting the discovery of HTTP request parsing issues, file upload vulnerabilities, and
Explore the fun and technical challenges of hacking a voting machine at DEFCON 25. Discover how to exploit Windows CE 5.0 system, SQLite3 database, and other se
Explore the technical details of Olympic Destroyer, a destructive malware that targeted the 2018 Pyeongchang Winter Olympics. Understand its attack methods and
Explore case studies illustrating how logical defects in online payments can lead to significant security issues. Learn about types of payment logic flaws and e
This article discusses the design and implementation of a simple port scanning threat perception system. It covers common APT attack methods, code examples in J
Explore the details of a critical vulnerability in Huawei HG532 routers exploited by a Mirai variant. Learn about the attack mechanism and how the security team
Learn how to create encrypted payloads using Meterpreter Paranoid Mode to bypass antivirus and host intrusion prevention systems. Discover the steps for generat