# Challenge XYZ writeup - Vulnerability: What type of vulnerability is being exploited - _Eg, SQL Injection, XSS, Endpoint is vulnerable to brute-force attack, etc_ - Where: Where is the vulnerability present - _Eg, `/guess/number` endpoint_ - Impact: What results of exploiting this vulnerability - _Eg, allows to find the server's guess by enumeration_ - NOTE: Any other observation ## Steps to reproduce 1. Do this 2. Do that 3. ... N. Now something bad happened ## POC ```Py ```