Explore >> Select a destination


You are here

highon.coffee
| | blog.ikuamike.io
8.0 parsecs away

Travel
| | Difficulty Release Date Author Beginner 2 Mar 2020 Zayotic Summary In this box, we first perform ldap injection on the web application to bypass the login page. Then we are able to read local files by abusing a local file inclusion vulnerability with php base64 filter. From one of the php files we get ldap credentials that we used to authenticate to ldap and dump entries. From the entries we get a base64 encoded password that we could use to ssh into the machine.
| | danaepp.com
11.3 parsecs away

Travel
| | Learn how to write exploits that take advantage of blind command injection vulnerabilities using a time-delayed boolean oracle attack.
| | notsosecure.com
12.5 parsecs away

Travel
| | Cryptography has various advantages including confidentiality of information. However overzealous reliance on cryptography for securing applications is a bad idea. In this blog Sunil Yadav our lead trainer for "Appsec for Developers" training class, will discuss a case study where a SQL injection vulnerability was identified and exploited via an encrypted payload. Note: We are
| | www.itechpost.com
58.4 parsecs away

Travel
| A critical vulnerability CVE-2022-1388 creates great concern for F5 BIG-IP products. Will patching make life better for the admins?