Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
The authentication on the site uses a SAML based model.
During the digital signature check on the application, it uses the first parameter even though multiple can be specified.
This creates a HTTP Parameter Poising vulnerability that can bypass security features.