Challenge similar to the last 3, the twist being that the injected string comes from image metadata. Metadata can be edited with a
Like the last two challenges, this one is a simple HTML injection. This one differs in that the injection isn't entered directl
Another beginner injection, but I was stumped. I entered a bunch of test strings and was able to get some response, but things didn
So, this one was kind of trivial. The original page source looks like this:
Most Recent Articles
This is a writeup of the format string vulnerability in level 4 of the 64bitprimer VM from vulnhu
Installation of the software to make a yubikey 4 work in FIDO U2F mode on Debian Jessie i386
This one stumped me. Overall, it was a great competition for me as I got to learn a whole lot of new things. I had never worked on a Mac, other than as a user, had never used Hopper, lldb or any of the other tools for reversing on a Mac, and haven't got any experience in the Objective C/Swift framework.