InsecureShop Write-up, all vulnerabilities explained
A full write-up for the InsecureSHop application, to serve for learning purposes
Please keep in mind that for the "Hack The Box" writeups the articles are protected with the root flag unless the machine is retired!
A full write-up for the InsecureSHop application, to serve for learning purposes
How an insecure implementation of SetResult can lead to exploitation of the available content providers.
Learn how an AWS Cognito Identity Pool can be identified in an APK and then checked if it is misconfigured.
A writeup for the machine Mango from hackthebox.eu with medium Difficulty
A writeup for the machine OpenAdmin from hackthebox.eu. Difficulty = Easy
A writeup for the machine Obscurity from hackthebox.eu with medium Difficulty.
You will currently find 10 categories!
Search articles directly or articles with specific categories or tags!