My last writeups for three easy challenges from 1753CTF.
Simple broken access control, Unicode normalization and bcrypt input truncation.
www.thesecuritywind.com/post/1753ctf...
My last writeups for three easy challenges from 1753CTF.
Simple broken access control, Unicode normalization and bcrypt input truncation.
www.thesecuritywind.com/post/1753ctf...
Sounds unfair to me, as it was exploitable. The only issue was in their web app. Correct me if I'm wrong
Nice flow! What was the reason they considered it as out of scope?
Which ones do think might be suitable?
๐
I guess it's less tested than other types of vulnerabilities, so I'm just curious.
Very interesting. How common do you think prototype pollution is in JavaScript web applications?
A small code-golf web challenge (free research from you, for me), how short can you make a "fetch content and execute it inline".
There is a CSP in a meta tag.
Goal: get the content from the file hack.js and have it inserted in the page. like in the image
joaxcar.com/xss/self.html
The Silent Sea
Amazing, good luck!
Here's a link to my latest blog post!
www.thesecuritywind.com/post/world-w...