Vulnerability Analysis
Resources Blog

Vulnerability Analysis

Keep up to date with the latest offensive security news, knowledge, and resources.
Vulnerability Hunting a Retired App Part 2 - From File Write to SYSTEM
Apr 16, 2026

Vulnerability Hunting a Retired App Part 2 - From File Write to SYSTEM

Discover how an unsanitized file write endpoint in Omega Enterprise Gateway escalates to SYSTEM-level code execution and what dead code reveals about real-world security bugs.
Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs
Mar 10, 2026

Please Show Your Work: Bypassing JavaScript Proof-of-Work CAPTCHAs

Understanding how SiteGround’s proof-of-work CAPTCHA silently disrupts automated WordPress security scans and how to work around it.
Vulnerability Hunting a Retired App Part 1 - Auth Bypass
Mar 03, 2026

Vulnerability Hunting a Retired App Part 1 - Auth Bypass

Decompiling a retired .NET application reveals how a single middleware misconfiguration leads to full authentication bypass.
Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting
Feb 26, 2026

Putting the Token Before the Cart? A Guide on E-Commerce API Pentesting

Why traditional API pentests miss real commerce risk and how cart tokens, checkout flows, and cross-layer auth gaps expose customer data.
6 Stages of the Vulnerability Management Lifecycle
Jan 08, 2025

6 Stages of the Vulnerability Management Lifecycle

The vulnerability management lifecycle is a structured approach to managing potential security weaknesses in information systems.
Vulnerability Testing: Process, Methods & Best Practices
Dec 27, 2024

Vulnerability Testing: Process, Methods & Best Practices

Vulnerability testing is the process of identifying, assessing, and addressing security weaknesses in systems, networks, or applications
1 2 3