Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
The host header being set to 127.0.0.1 bypasses all authentication!
The unwritten API is quite cool too! Because the APIs just check for all functions in a file, without an underscore (private function) then all of the IMPORTS will also work as API endpoints. So genius!
Finding exploits just take a long time! A lot of recon and testing.