Javascript - Obfuscation 2
Points: 10 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Obfuscation-2 Description Going down 3 floors….. Solution This is the site’s HTML code: <html> <...
Points: 10 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Obfuscation-2 Description Going down 3 floors….. Solution This is the site’s HTML code: <html> <...
Points: 10 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Obfuscation-1 Solution Let’s visit the site’s source code: <html> <head> <title>O...
Points: 15 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Native-code Statement No clue. Solution This is the site’s HTML code: <html> <head> <title&...
Points: 5 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Authentication Analyzation Firstly, check the site’s HTML code and CSS code by browser, nothing special at all… ...
Points: 10 Link: https://www.root-me.org/en/Challenges/Web-Client/Javascript-Authentication-2 Description Yes folks, Javascript is damn easy :) Solution Let’s visit the site’s source ...
Points: 5 Link: https://www.root-me.org/en/Challenges/Web-Client/HTML-disabled-buttons Description HTML protection? Statement This form is disabled and can not be used. It’s up to ...
Level: 1 Link: https://dreamhack.io/wargame/challenges/415/ Description This is the problem that you practice in the SQL Injection Bypass WAF. Attached CREATE DATABASE IF NOT EXISTS `...
Level: 1 Link: https://dreamhack.io/wargame/challenges/24/ Description This is a login service. Obtain the flag through the SQL INJECTION vulnerability. The flags are in the flag.txt,...
Level: 1 Link: https://dreamhack.io/wargame/challenges/409/ Description It is a simple login service that manages authentication status with cookies and sessions. If you successfully log...
Level: 1 Link: https://dreamhack.io/wargame/challenges/46/ Description This is a Back Office service written in php. Use the LFI vulnerability to obtain the flag. The flag is located ...