Me, Burp Suite, and a banking site that had absolutely no idea what was coming. ๐
March 22, 2026 ยท 3 min read
I've been going down the cybersecurity rabbit hole lately specifically application security and turns out breaking stuff is genuinely fun. So I did what any reasonable person does: found an intentionally vulnerable banking app and went to practice.
Target: demo.testfire.net . Mode: pure black-box - no source code & no hints. Just me, Brave, and Burp Suite ready to cause some problems.
Short answer: a lot. Long answer: 25 vulnerabilities. Built different. Unfortunately, that difference was entirely in the wrong direction.
alert() popped)'OR 1=1-- supremacy)admin / adminI documented everything โ every payload, every response, every "wait, really?" moment.
View Full Report โSecurity isn't always some elite hacker movie moment. Most of these came down to bad validation, weak logic, and genuinely avoidable mistakes. "The scariest vulnerabilities aren't complex... they are lazy." - Our college professor (bro left college after 1 month btw).
Technically no. Legally yes I'm fine. It's a demo site so the whole point is getting broken. But honestly, poking at how systems fall apart is the fastest way to understand how to build ones that don't. 10/10 would break again. ๐