Explore >> Select a destination


You are here

www.sjoerdlangkemper.nl
| | golb.hplar.ch
15.0 parsecs away

Travel
| |
| | blog.nuculabs.dev
20.3 parsecs away

Travel
| | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist.
| | palant.info
16.8 parsecs away

Travel
| | Allowing password-based authentication without letting the server know the password is fascinating. Unfortunately, for web applications this doesn't solve any problems.
| | blog.securityinnovation.com
98.7 parsecs away

Travel
| Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.