619x < 2024 >
This format is used to document how a vulnerability was found or a "Capture The Flag" (CTF) challenge was solved.
Which company rule or expectation was not met. This format is used to document how a
A single sentence stating the primary topic or thesis. This format is used to document how a
A summary of the findings and their implications for the reader. This format is used to document how a
Step-by-step walkthrough of the commands or scripts used to gain access.