Use your exploitation skills to bypass authentication mechanisms on a website and get RCE. The post Write-up: Hammer appeared first on Wild Wild Wolf.| Wild Wild Wolf
The librarian rushed some final changes to the web application before heading off on holiday. In the process, they accidentally left sensitive information behind! Your challenge is to find and exploit the vulnerabilities in the application to extract these secrets. The post Write-up: Extract appeared first on Wild Wild Wolf.| Wild Wild Wolf
Cipher’s legion of bots has exploited a known vulnerability in our web application, leaving behind a dangerous web shell implant. Investigate the breach and trace the attacker's footsteps!| Wild Wild Wolf
I love a good crackme. It was one of the first things I practised when I did my first CTF (Pico) this year. This challenge is for newcomers to Reverse Engineering. Crackme1 Nothing special, you just need to give execution permissions to the binary and then execute it. Crackme2 This binary asks us for a […]| Sharp Security