You are here |
www.thezdi.com | ||
| | | |
mouha.be
|
|
| | | | ||
| | | |
seclists.org
|
|
| | | | ||
| | | |
blog.nuculabs.dev
|
|
| | | | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist. | |
| | | |
blog.phylum.io
|
|
| | At the end of March 2024, a major software supply chain attack was identified: some upstream forks of the popular xz/liblzma library that underpins the massively popular OpenSSH Server was compromised. A rogue contributor appears to have worked to influence the maintainers of the library, adding in seemingly innocuous |