# TutorialBoy > Our mission is to get you into information security. We'll introduce you to penetration testing and Red Teaming. ## Recent Posts - [Spring Actuator - Stealing Secrets Using Spring Actuators - Part 1:](https://paragraph.com/@tutorialboy/spring-actuator-stealing-secrets-using-spring-actuators-part-1) - [A Study Notes of Exploit Spring Boot Actuator](https://paragraph.com/@tutorialboy/a-study-notes-of-exploit-spring-boot-actuator) - [A Talk about Logic Vulnerabilities of Android Components - Android Security](https://paragraph.com/@tutorialboy/a-talk-about-logic-vulnerabilities-of-android-components-android-security) - [An Unsafe Deserialization Vulnerability and Types of Deserialization](https://paragraph.com/@tutorialboy/an-unsafe-deserialization-vulnerability-and-types-of-deserialization) - [Getting Started with Internet of Vehicles Security - CAN Simulation](https://paragraph.com/@tutorialboy/getting-started-with-internet-of-vehicles-security-can-simulation) - [The Unbounded Loops Vulnerability : Denial of Service](https://paragraph.com/@tutorialboy/the-unbounded-loops-vulnerability-denial-of-service) ## Blog Information - [Homepage](https://paragraph.com/@tutorialboy/): Main blog page - [RSS Feed](https://api.paragraph.com/blogs/rss/@tutorialboy): Subscribe to updates ## Optional - [All Posts](https://paragraph.com/@tutorialboy/): Complete post archive - [Sitemap](https://paragraph.com/@tutorialboy/sitemap-index.xml): XML sitemap for crawlers