- Heroku app Deployment
Challenge 0
"><svg onload=prommpt(1)>
Challenge 1
<img src=1 onerror=prompt(1)/
Challenge 2
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Fix, gdb shared lib | |
Try compiling using gcc -fno-builtin. | |
gdb: “No symbol table is loaded” | |
gcc -g prog.c |
I hereby claim:
- I am vjex on github.
- I am avicoder (https://keybase.io/avicoder) on keybase.
- I have a public key whose fingerprint is BBE5 FC5D 3AC2 BB78 C6A4 1D9D 4B0B A549 62AB A6CC
To claim this, I am signing this object:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script type="text/javascript"> | |
var enforce = "avicoder.me"; | |
if ((enforce == window.location.host) && (window.location.protocol != "https:")) | |
window.location = window.location.toString().replace(/^http:/, "https:"); | |
</script> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
_CONST SEGMENT ; or _DATA | |
$SG1234 DB 'Hello, World',0AH,00H | |
_CONST ENDS | |
_TEXT SEGMENT | |
push ebp | |
move ebp,esp | |
push OFFSET $SG1234 | |
call _printf | |
add ebp,4 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /usr/bin/python | |
#Author == @avicoder | |
import sys,getopt | |
r = '\033[31m' #red | |
b = '\033[34m' #blue | |
g = '\033[32m' #green | |
y = '\033[33m' #yellow |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Open Inspect element or scratchpad and run the command below...*/ | |
links = document.links; | |
for (i = 0; i < (links.length); i++) { | |
console.log(links[i].href); | |
} |
####Injection
-
Injection could be anything, It could be Sql, LADAP , XAPth, Mail Based injection or any other database.
-
Malicious request to modified query is an injection
-
Data exfiltration
-
Defences:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
netsh wlan set hostednetwork mode=allow ssid=Paladion-Hotspot key=paladion123! | |
netsh wlan start hostednetwork |