Security Notes
Search...
Ctrl
K
Pentesting
write-ups
Previous
Linux Privilege Escalation
Next
How i found a Privilege Escalation via Impersonation Features feature
Last updated
1 month ago
How i found a Privilege Escalation via Impersonation Features feature
How I was able to discover ATO Via IDOR vulnerability
Easy full Account Takeover via Facebook OAuth Misconfiguration