-
Pubg Stuck on Loading Screen and Ping Error Solutions Android
Pubg (PlayerUnknown’s Battlegrounds) is being played world wide now. So many users is proportional to so many error. I have been playing pubg for about a week now and faced the following problems: 1. The selected server may have higher ping. 2. After Clicking on Start, The game keeps loading and the player’s arena doesn’t come…
-
HackTheBox Node:1 Vulnhub CTF Walkthrough
Node CTF is available at: https://www.vulnhub.com/entry/node-1,252/ This Vulnerable machine Node is based on the new technologies and how we can hack into them. It uses Node Express server Json and hadoop. There are many ways to hack into the machine, here is my way. Let’s dive in the machine: If you are having problem with setting…
-
SQL Injection on Base64 Encoded String Parameters
This article is a guide to perform SQL Injection on the Base64 encoded Url parameters. These parameters are encoded so as to make the site injection proof but that is a big myth. Recently I came across “www.somesite.com/index.php?pid=VkRGRk9WQlJQVDA9″ this kind of URLs. The pid here, “VkRGRk9WQlJQVDA9“. It is nothing but 4 times encoded base64 string,…
-
OVERTHEWIRE NATAS SERIES: 25 – 26 LEVEL Walkthrough
Overthewire Natas Level 25 – 26 is based on directory traversal. The code have many restrictions because it sanitizes the user input and makes it harder for us to get the password. Let’s see how can we bypass it and get the access for the next level. The code for this level is here: The…
-
OVERTHEWIRE NATAS SERIES: 24 – 25 LEVEL Walkthrough
Overthewire Natas 25 Level is based on strcmp() function vulnerability. Generally, strcmp() is used to compare two strings together, We need to generate some kind of error here so we can obtain the password for the next level. The code for the level is here: So, I tried a lot of ways to generate error…
-
OVERTHEWIRE NATAS SERIES: 23 – 24 LEVEL Walkthrough
Overthewire natas level 23 – 24 is also based on PHP GET request parameter tampering. We have to carry out the injection in such a way that it fits both the conditions of the code. The code for this level is here: The two conditions to be fulfilled are: 1. passwd parameter should contain the…
-
OVERTHEWIRE NATAS SERIES: 22 – 23 LEVEL Walkthrough
Overthewire natas level 22 – 23 is the easiest of all levels, We just have to send a GET request as “/?revelio” to reveal the admin password. This code for this level looks like this: So, again I am using Burpsuite’s Repeater in order to make the GET request and here you go, the password…
-
OVERTHEWIRE NATAS SERIES: 21 – 22 LEVEL Walkthrough
Overthewire natas level 21 -22 is also like the last level but, there is Key and value pair as the input values. All we need to do is inject admin=1 as one of the key->value pair and we will get the password. There are two different pages in this level which shares information with each…
-
OVERTHEWIRE NATAS SERIES: 20 – 21 LEVEL Walkthrough
OVERTHEWIRE NATAS level: 20 – 21 is quite different than all the other that we have completed. The code for this level is pretty hard to understand but took me a while but it’s done now. The problem lies in php code and how it is handling user input with the help of keys. We…
-
OVERTHEWIRE NATAS SERIES: 19 – 20 LEVEL Walkthrough
OVERTHEWIRE NATAS level 19-20 is similar to 18-19 level. We have to manipulate session in order to login as admin. In the last level, we just have to change the PHPSESSIONID number in order to gain the access to the admin account. We have to do the same in this level too but here the…
-
OVERTHEWIRE NATAS SERIES: 18 – 19 LEVEL Walkthrough
OVERTHEWIRE NATAS level 18-19 is based on session bypass. We have to login as admin without any credentials, in such cases we can look for the session value and try to change it because that’s the only way in after there is no credentials. So let’s do this. The code for the natas 18-19 level…