login_filteringpyc decompileWTF_CODEmd5 comparefly to the moontmitterimg_recoveryphp? c?web_chattingSimpleBoardip_log_tablelonely_guyscrack_crack_crac
Intro 1Intro 2Intro 3Intro 4Intro 5Intro 6Intro 7Intro 8Intro 9Intro 1224 bitWorld of Peacecraft / RealisticSecure agentCrypt 1 / CryptBeachLibrary Ga
iron_golemxavisdark_eyeshell_fireevil_wizardgreen_dragonred_dragonfrankensteinphantomouroboroszombiealiencthulhudeathgodzillacyclopschupacabramanticor
robots.txt를 확인하자.?id=5button=flag로 value 값을 수정하면 된다.코드 짜서 다 하다보면 나온다.extract 취약점.filename=flag.txt가 되도록 변수를 정해주자.풀이 : ?filename=flag.txt&guess=Nah...아
CSP Bypass- Inline codeCSRF - 0 protectionFlash - AuthenticationXSS - ReflectedXSS - Stored 2