Terminal Intelligence Securityterminalintelligencesecurity.hashnode.dev·Mar 10, 2024Perfection HTB WriteupDuring enumeration, it was noticed that Input validation bypass refers to exploiting weaknesses in an application’s validation checks to submit malicious data that bypasses intended restrictions. Attackers use techniques like filter evasion, context ...1.5K readsPerfection-walkthrough,
saurabh sharma.blog.esskayesss.dev·Mar 29, 2023E1: Intro to Offensive Securityintroduction and a foreword. This room provides an opportunity for you to get hands-on experience of breaking a hypothetical banking system, by gaining access to a critical page that was public by design, but not indexed anywhere on the website. Addi...2 likes·192 readstryhackme.tryhackme