Welcome, future security incident creators! Today we’ll learn the fine art of writing code so vulnerable that hackers will send you thank-you cards. Because who needs job security when you can have security vulnerabilities?
Transforming security from an external constraint into an integral part of engineering excellence
Whenever we talk about how to find authentication vulnerabilities, first we should look at what is the meaning of authentication?
Authentication is the process of verifying the identity of a given user or client. In other words, it involves making sure that they really are who they claim to be.
Challenge Category: OSINT
Challenge:
The author is running his own tech blog and is hiding a weird thing on its source. (Hey player, do you like copy-pasting things and throwing your waste in the bin?).
Author: cybersapien
Challenge Category: OSINT
Challenge:
The author is a professional person and has a medium to run his own blog. He likes the white colour the most. Can you spot the flag?
Author: cybersapien