Files
ssof_labs/pa/template_wu.md
2025-11-20 19:37:58 +00:00

497 B

Challenge XYZ writeup

  • Vulnerability: What type of vulnerability is being exploited
    • Eg, SQL Injection, XSS, Endpoint is vulnerable to brute-force attack, etc
  • Where: Where is the vulnerability present
    • Eg, /guess/number endpoint
  • Impact: What results of exploiting this vulnerability
    • Eg, allows to find the server's guess by enumeration
  • NOTE: Any other observation

Steps to reproduce

  1. Do this
  2. Do that
  3. ...
    N. Now something bad happened

POC