Explore >> Select a destination


You are here

abuisman.com
| | fabianlindfors.se
3.0 parsecs away

Travel
| | MSc Computer science student
| | janko.io
4.0 parsecs away

Travel
| | In this tutorial, we'll show how to add fully functional authentication and account management functionality into a Rails app, using the Rodauth authentication framework. Rodauth has many advantages over the mainstream alternatives such as Devise, Sorcery, Clearance, and Authlogic, see my previous article for an introduction.
| | blog.codeminer42.com
3.3 parsecs away

Travel
| | As we all know, it is quite easy to create database tables with Ruby On Rails. However, some cases require personalizations to reproduce real world situations and the relationships between them. Here, we have two models: User and Meeting, with a 1..N relation where one Meeting has two User (yes, a two-person meeting.) The problem
| | blog.0x7d0.dev
22.3 parsecs away

Travel
| Bookworm is an Insane-difficulty machine from Hack The Box. We will exploit an XSS vulnerability to gain access to a grandfathered feature accessible only to a few users. Subsequently, we'll leverage a Path Traversal vulnerability to acquire an initial password. Then, we will exploit a bug in an internal HTTP service to pivot to another user. This second user will possess privileges to a system for generating shipping labels, vulnerable to a double injection, allowing us to escalate our privileges to root.