Research Real-world findings from live penetration-testing engagements: redacted, documented, published. Work with our team
Research & Insights · Issue №04

Field Notes From The
Offensive Security Team.

Every post is drawn from a real penetration-testing engagement: redacted for privacy, kept honest on the technical detail. Exploit chains, reproduction steps and the code-level fixes that actually close the gap.

All topics Mobile Web AppSec Auth & Identity
Published articles
04
Authoring practitioners
03
Live engagements behind them
100%
Average read
7.5 min
Featured Finding

The bug we keep thinking about.

Updated weekly · latest Jul 28, 2025

More from the team

03 · Ordered most recent first
Exploiting a Weak JWT Secret Key
Application Security Nov 4, 2024

Exploiting a Weak JWT Signing Secret: A Case Study

A production JWT signing key that still read "THIS IS USED TO SIGN AND VERIFY JWT TOKENS, REPLACE IT WITH YOUR OWN SECRET." Hashcat did the rest. Full account impersonation followed.

OAuth CSRF: The State Parameter Trap
Authentication Oct 29, 2024

OAuth-Based CSRF: The State-Parameter Trap

The state parameter was present in the request, but it was static, shared across every account. Copy-paste the URL to a victim's browser and the OAuth flow linked your Facebook to their account.

More write-ups in draft.

Follow the team on LinkedIn. We publish every finding that survives disclosure.

Follow on LinkedIn
Want Our Team On Your Application?

The Same Engineers Who Write These Findings Run The Engagements.

Fixed-price statement of work within 48 hours. Senior practitioners, not junior analysts, on every assessment.