Practical Malware Researcher Professional (PMRP, aka PJMR) Certification ReviewIn late February 2023, TCM security launched their brand-new certificate - Practical Junior Malware Researcher (PJMR, I called it pajamas). In this blogpost I wanted to share my experience of taking the exam for this certification, and what it feels ...Jun 8, 2023·7 min read
Stored XSS into HTML context with nothing encodedThis is a writeup for a challenge from PortSwigger's Web Security Academy. In this one, we will learn how a Stored Cross Site Scripting (XSS) vulnerability works, how it can be exploited and what an attacker can gain out of it. In the previous writeu...Dec 2, 2021·1 min read
Reflected XSS into HTML context with nothing encodedThis is a writeup for a challenge from PortSwigger's Web Security Academy. In this one, we will learn how a simple Cross Site Scripting vulnerability works, how it can be exploited and what an attacker can gain out of it. Objective This lab contains ...Dec 1, 2021·2 min read
SQL injection vulnerability allowing login bypassThis is a writeup for a challenge from PortSwigger's Web Security Academy. In this one, we will learn how to bypass the login page with a simple SQL injection Objective This lab contains an SQL injection vulnerability in the login function. To solve ...Nov 29, 2021·1 min read
SQL injection vulnerability in WHERE clause allowing retrieval of hidden dataThis is a writeup for a challenge from PortSwigger's Web Security Academy. In this one, we will learn how an SQL injection can be discovered and exploited to display hidden products or similar. Objective This lab contains an SQL injection vulnerabili...Nov 25, 2021·2 min read
Nebula - 11The /home/flag11/flag11 binary processes standard input and executes a shell command.There are two ways of completing this level, you may wish to do both :-) Source code #include <stdlib.h> #include <unistd.h> #include <string.h> #include <sys/types...Oct 31, 2021·5 min read
Nebula - 12There is a backdoor process listening on port 50001. To do this level, log in as the level12 account with the password level12. Files for this level can be found in /home/flag12. Source code local socket = require("socket") local server = assert(soc...Oct 31, 2021·1 min read