Lab2
This commit is contained in:
22
pa/template_wu.md
Normal file
22
pa/template_wu.md
Normal file
@@ -0,0 +1,22 @@
|
||||
# Challenge XYZ writeup
|
||||
|
||||
- Vulnerability: What type of vulnerability is being exploited
|
||||
- _Eg, SQL Injection, XSS, Endpoint is vulnerable to brute-force attack, etc_
|
||||
- Where: Where is the vulnerability present
|
||||
- _Eg, `/guess/number` endpoint_
|
||||
- Impact: What results of exploiting this vulnerability
|
||||
- _Eg, allows to find the server's guess by enumeration_
|
||||
- NOTE: Any other observation
|
||||
|
||||
## Steps to reproduce
|
||||
|
||||
1. Do this
|
||||
2. Do that
|
||||
3. ...
|
||||
N. Now something bad happened
|
||||
|
||||
## POC
|
||||
|
||||
```Py
|
||||
|
||||
```
|
||||
Reference in New Issue
Block a user