Oct 14, 2021
·
6 min readCap starts by identifying an IDOR vulnerability on its hosted website. Using this IDOR, I can obtain …
Sep 16, 2021
·
11 min readMoodle exploitation using CVEs
Aug 28, 2021
·
4 min readExploiting the backdoor planted in PHP 8.1-dev
Aug 06, 2021
·
9 min readCode execution with path traversal
Jul 13, 2021
·
4 min readHands on with ShellShock vulnerability
Jul 02, 2021
·
3 min readA ctf for beginners, can you root me?
May 30, 2021
·
8 min readDC-6 starts off by enumerating usernames from a WordPress website and use a brute-force attack …
Apr 28, 2021
·
10 min readExample of a phishing attack and PyPI package exploitation
Apr 02, 2021
·
6 min readExploiting OpenNetAdmin vulnerability and sudo nano