How I found critical security vulnerabilities in McDonald's systems affecting millions of employees, and had to cold-call their HQ pretending to know security staff just to report them.
I’ve posted this on HN too, but the author seems a bit… immature in their handling of things? Using a friend’s login to pentest stuff (causing the friend to get fired, rightfully so), defacing internal applications, creating bogus orders…
They’re cocky and they don’t fully seem to grasp yet how their behavior works against them.
I’ve posted this on HN too, but the author seems a bit… immature in their handling of things? Using a friend’s login to pentest stuff (causing the friend to get fired, rightfully so), defacing internal applications, creating bogus orders…
They’re cocky and they don’t fully seem to grasp yet how their behavior works against them.