Jan 10 · 20 min read · After exploring IAAA (Identity, Authentication, Authorization, and Accountability) failures in the previous room, I moved on to what many consider the most challenging category of vulnerabilities to fix: Application Design Flaws. Unlike authenticatio...
Join discussion
Jan 8 · 12 min read · The OWASP Top 10 has long been the gold standard for understanding web application security risks, and the 2025 edition continues to highlight critical vulnerabilities that plague modern applications. In this TryHackMe room, I explored three intercon...
Join discussion