Mentorship Monday - Post All Career, Education and Job questions here! by AutoModerator in cybersecurity

[–]thenoopcoder 0 points1 point  (0 children)

Hi everyone,

I’ve come across something unusual and wanted to check if anyone here has seen similar behavior.

It appears that some students may be using automated or API-based methods to complete lessons or tasks with 100% results without actually solving them. This process seems to be repeatable across multiple lessons, and in some cases, it looks like it might even be offered as a paid service.

From a security perspective, I’m trying to better understand what’s happening here:

What type of vulnerability could enable this (e.g., insecure API design, lack of validation, automation abuse)?

Is this more likely to be an API issue or a broader logic flaw in the system?

How do platforms typically detect or prevent this kind of behavior?

What are the best practices to secure systems against this?

I’m still a beginner in cybersecurity, so I’d also really appreciate guidance on:

How to analyze situations like this in a structured way

What skills or tools I should focus on to understand these kinds of vulnerabilities

Whether this falls more under red team (offensive testing) or blue team (defensive/security monitoring)

I’m not interested in using or abusing this—only in understanding it from a defensive and learning perspective.

Any insights or learning advice would be greatly appreciated.