Tagged articles
2 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 7, 2026 · Information Security

How I Uncovered Multiple Vulnerabilities in My Alma Mater’s Campus App

The article details an authorized penetration test of a university campus app, revealing sensitive data leakage, horizontal and vertical privilege escalation, face‑photo tampering, and a stored XSS flaw, each demonstrated step‑by‑step with packet captures and screenshots.

information leakagemobile app securitypenetration testing
0 likes · 6 min read
How I Uncovered Multiple Vulnerabilities in My Alma Mater’s Campus App
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 2, 2017 · Information Security

Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools

This article explains broken link hijacking, detailing stored and reflected attack vectors such as account spoofing, external JavaScript takeover, information leakage, and content hijacking, provides real‑world examples, and introduces practical tools like broken‑link‑checker and twitterBFTD for discovering vulnerable expired links.

broken link hijackingreflected XSSsecurity tools
0 likes · 6 min read
Uncovering Broken Link Hijacking: Techniques, Real‑World Cases, and Detection Tools