ASYLUM-403 // CLASSIFICATION: RESTRICTED FILE REF: PSY-OPS-8326-A
// SUBJECT DOSSIER — ACTIVE CASE
PATIENT-8326
Weaponizing curiosity against broken systems.
Bug hunter. Breach architect. Perpetual patient.
The ward couldn't hold him. Neither could the perimeter.
ROOT
ACCESS
ASYLUM-403
ESCAPEE?
UNCONFIRMED
IDENTITY REDACTED
ID: PT-8326
Designation Patient8326
Status ACTIVE // AT LARGE
Threat Level ESCALATING
Location ████████████
Lab Engagements SEC-01
22 CTF Labs Completed ▸ Click to view record
Confirmed Exploits SEC-02
3 Real-World Vulnerabilities ▸ Click to view breakdown
Field Log SEC-03
3 Findings Logged ▸ See log below
Exploit Index // Real-World Findings EXP-LOG
Severity Vulnerability Target Status
MEDIUM
CVSS ~5.3
Rate Limit Bypass — Business Logic
Company: █ CLASSIFIED █
████████████████ DISPUTED
CRITICAL
CVSS ~9.1
IDOR — Mass Object Exposure
Company: █ CLASSIFIED █
Nationwide platform. Any user record accessible via URL ID manipulation.
████████████████ IN ESCALATION
HIGH
CVSS ~7.5
IDOR — Billing UserID in URL
Company: █ CLASSIFIED █
████████████████ UNRESOLVED
Operational Training TRK-01
Done
What the Shell?
THM // Jr Penetration Tester Path
Active
Linux Privilege Escalation — 97%
THM // 8 privesc techniques, hands-on
Windows Privilege Escalation
THM // Jr Penetration Tester Path
OverTheWire — Bandit
OTW // Linux fundamentals, SSH, file perms
Hacker101 CTF — Full Clear
H1 // 47pts — Private Program Eligible
Field Log // Intel Transmissions LOG-01
Rate Limit Bypass — Business Logic
████████ DISPUTED — DETAILS WITHHELD ████████
IDOR — Mass Object Exposure
████████ CLASSIFIED — IN ESCALATION ████████
IDOR — Billing UserID Exposed in URL
████████ CLASSIFIED — UNRESOLVED ████████
▸ Access Full Archive
Establish Contact // Secure Transmission COM-01
// Encrypted Mail
patient8326@atomicmail.io
Bug reports. Collaboration. Responsible disclosure inquiries.
No unsolicited marketing. No exceptions.
SECURE
CHANNEL
PREFERRED