This entry was posted in Research, Vulnerabilities, WordPress Security on March 17, 2021 by Ram Gall
Hey guy’s I would like to discuss the term “hackers”.
I just came across an article which was written by Mr. Marc Wikenden whose life experience was akin to mine. So I would like to share the similar experiences (akin to Marc) which I’ve experienced as a cyber security enthusiast.
All of us in the late 20th century are all too aware of the abuse of the term called hacker’s and its association with the kid in the dark room breaking into computers in some distant corner of the Internet.
While strictly speaking the definition of a hacker has become…
Points: 100 (101 solves)
A committee was formed last year to decide the highly-sensitive contents of our challenges. All we could find is their profiles on this website. They are super paranoid that their profile site is hackable and decided to implement insane rate limits. Really we need to get access to the admin's password. If only that was possible.
Traceback (most recent call last): File "unionflaggenerator.py", line 49, in do_GET cursor.execute("SELECT id, name, email FROM users WHERE id=" + params["id"]) sqlite3.OperationalError: near "<": syntax error
SELECT id, name, email FROM users WHERE id=1 UNION SELECT id, password, email FROM users
For further reference on SQL injection check out my previous blog using the link below,
Thank you for reading, stay tuned for more interesting content.
(or RFC 3986 vs WHATWG URL Specification vs the real world)
In this blog i would attempt to describe where and how RFC 3986 (86), RFC 3987 (87) and the WHATWG URL Specification (TWUS) differ.
This might be useful input when trying to interop with URLs on the modern Internet.
In my previous blog on , “Learning the Art of Bug bounty” (Currently edit on progress) . we went on a journey to learn about bug bounty and we came across an interesting report submitted by Mr.Jonathan Leitschuh to Curl, where Mr. …
Cyber Security is really hard to learn. It’s not just broad and deep, but also consists of many other fields in technology and computing. I get a lot of questions asking what course to take to learn cyber security, which is kind of tough to answer which is because the real answer is: there is no course, just a journey. And everybody you gonna ask is going to give you a different answer, since each of their journeys are different as well. Its almost like asking several World Chef’s on how to cook a certain receipe, Everybody’s going to give…
In this tutorial I’m gonna take you through the top 5 skills you need to be learning to get into cyber security.
If you’re new to the field or looking for a career transition, there’s just so much info out there, that it’s hard to even get started. You might hear people talk about alphabet soup of certifications to take like CEH, SEC+, NET+, CISM, CISSP, CASP, CCSP, SSCP, OSCP/E, GSEC, APT and many more, but I’m here to tell you that they’re not important. While there’s some value going through the process of studying for certs, what is important…
Hey guy’s welcome to my blog!
Few days back i happened to come across an article written by Bert Hubert, he is an entrepreneur & software developer. He sometimes contributes to science, and care’s a lot about innovation, biology & health. A proud shareholder of Open-Xchange, the parent company of PowerDNS which He founded in 1999. Recently, he joined a government board.
In this post, I will be taking you to a character-by-character approach to look at the source code of the BioNTech/Pfizer SARS-CoV-2 mRNA vaccine which he (Bert Hubert) reverse-engineered recently, I hope you’d enjoy reading this blog.
In this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection.
What is “NACTF” ?
Newark Academy CTF (NACTF) is an online jeopardy-style cybersecurity competition hosted by Newark Academy’s Computer Science Club. Form teams with up to 5 members and win awesome prizes! Teams compete to decrypt, hack, or reverse engineer challenges in topics like cryptography, forensics, and binary exploitation. Participation is open to anyone but prizes are restricted to US middle school and high school students.
Flag Checker Industries™ has released their new product, the Generic Flag Checker®! Aimed at being small, this hand-assembled executable checks your flag in only 8.5kB! Grab yours today!
Challenge Name : Steg1
Challenge Task : In the grand tradition of great stegano tasks. stego.mp4
Author : Author: rugo,fluxhorst|RedRocket
This challenge was my very first stenography challenge, so i was literally wondering where to begin from. I just browsed a few webpages about concepts and tools required for stenography, but i couldn’t find one suitable for the video file provided in this challenge. So i just started playing the STEGO.MP4 file in my browser.
I never hear from most of my high school classmates unless their email account gets hacked.