Laravel Authentication Bypass
Comprehensive guide on exploiting Laravel authentication vulnerabilities and implementing secure password validation systems[2][3].
Detailed solutions and learning resources from our CTF journey
At Y3ti@Sec, we believe in sharing knowledge to help everyone grow in the world of cybersecurity. Our writeups cover many different CTF challenges, such as web security, password validation, webhook protection, Laravel authentication and more.
Each writeup includes clear explanations, step-by-step solutions, and example code to make it easy to follow. Whether you’re just starting out or already experienced, our guides offer helpful tips and insights to improve your skills and understand how these challenges work.
By learning together, we aim to build a stronger, smarter cybersecurity community in Nepal and beyond.
Comprehensive guide on exploiting Laravel authentication vulnerabilities and implementing secure password validation systems[2][3].
Advanced XSS vulnerability analysis and exploitation methods using modern web security techniques[4].
Deep dive into webhook integration security using webhook.site for CTF challenges and troubleshooting techniques[1].
Step-by-step walkthrough of the LazyAdmin room focusing on web enumeration and privilege escalation techniques.
Comprehensive analysis of the Bashed machine including initial foothold, enumeration, and root exploitation.
Security administration best practices focusing on user management and phishing prevention techniques[5].
We're always looking for quality writeups from the cybersecurity community. Share your knowledge and help others learn!