|
You are here |
tcode2k16.github.io | ||
| | | | |
blog.ikuamike.io
|
|
| | | | | Difficulty Release Date Author Beginner 2 Mar 2020 Zayotic Summary In this box, we first perform ldap injection on the web application to bypass the login page. Then we are able to read local files by abusing a local file inclusion vulnerability with php base64 filter. From one of the php files we get ldap credentials that we used to authenticate to ldap and dump entries. From the entries we get a base64 encoded password that we could use to ssh into the machine. | |
| | | | |
chsakell.com
|
|
| | | | | I cannot recall any real Web Application that doesn't make use of the Session State feature, the one that is capable to store data that are available across multiple requests from the same browser. More over, in this very modern times, Web Applications tends to make extensive use of Ajax requests to the server, in... | |
| | | | |
www.thapatechnical.com
|
|
| | | | | [AI summary] The article provides a tutorial on implementing CRUD operations (Create, Read, Update, Delete) using PHP and MySQLi, including code examples for database connection, insertion, display, deletion, and updating data. | |
| | | | |
www.taniarascia.com
|
|
| | | In the early days of the Web, websites consisted primarily of HTML and CSS. If any JavaScript loaded into a page at all, it was usually in... | ||