Abusing PHP Session Handlers: Python Web Hacking | Natas: OverTheWire (Level 20)

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

man I love your content. you move quickly but the vids are short enough I can watch them multiple times and I get it lol. keep up the good work bro

padaloni
Автор

Is the ctf still online, so I can check my idea? My first intuition was to add a key with a space (admin 1=), it would be great if I could verify that.

StefanSchlott
Автор

Thanks for the video, I discovered the google ctf thanks to your channel, but where can I find the photo of the kitten fleeing spions maskots ? I tried googling it but I can't find it.

marouaniAymen
Автор

I wonder, throughout the videos I've noticed that in Sublime text there's also php displayed, however all php is hidden in dev tools if I remember correctly. Does it mean that you can sort of see more with python than with regular dev tools in terms of php?

poryg
Автор

I still dont get it, why do we do the \n and get to new line and then put admin 1 and it works, please i need a little explanation on this

ArkanoidGaming
Автор

very nice, I need to know how can I practice and improve my programming skills if was web application code revewier, build an application or read a specific book or what I need to reach expert level and find vulnerability?

farisfaisall
Автор

The way I found ur account is by someone writing your YouTube on the wall in the men's bathroom at my work 😂

milkymercury
Автор

I achieved RCE through XSS on the Router UI challenge for the google ctf, but I don't know what to run to get the flag. Any suggestions?

RitobanRoyChowdhury
Автор

I didn't understand this at all
Why do we want to add a new line?
Why wouldn't work only with "admin 1"?

maripallacosta
Автор

Is the source code always this easily accessible?

alexpaww
join shbcf.ru