A Real Authorization Flaw I Found by Modifying a PUT Request
A high-level write-up on an authorization gap found by modifying a legitimate PUT request and why request-layer testing matters.
Read More →Where I build, break, document, and refine technical projects. This site serves as a central hub for hands-on labs, experiments, and notes across systems engineering, networking, Linux, VoIP, cloud, security, and automation.
ddp@goat:~$ cat home.html
<h1>Welcome to My Digital Workshop</h1>
<h2>Notes, labs, and automation.</h2>
<p>Where I build, break, document, and refine technical projects. This site serves as a central hub for hands-on labs, experiments, and notes across systems engineering, networking, Linux, VoIP, cloud, security, and automation.</p>
Quick access to essential guides and tools.
Practical VoIP notes and server ops commands for real-world troubleshooting, with more SIP and network references coming.
Study guides and notes for CompTIA certifications including PenTest+, CySA+, Linux+, and Network+.
A high-level write-up on an authorization gap found by modifying a legitimate PUT request and why request-layer testing matters.
Read More →