oauth misconfigurations authorization csrf
QUIC HTTP/3 protocol impersonation DNS
Reverse engineering ctf dot net R2R
rsa crypto math
ctf reversing crypto rsa
web race condition http wireshark burp