I played CTF and also joined Root Me to dive into security challenges, testing and improving my knowledge in computer security and hacking. For educational purposes, I wrote solutions to challenges that I had solved, giving you all a chance to solve them yourselves. While they may be outdated and not fit the current challenges, I believe they could still help you at least a little bit.
The flag is hidden by
*
, but the guide is also detaily, not need to care about it 😅
If you find it helpful, please consider giving me a star to brighten my day, IJK bro 🥲
SQL injection - Authentication GBK
SQL injection - Authentication
File upload - Double extensions
Local File Inclusion - Double Encoding
Local File Inclusion - Wrappers
PNG - Pixel Indicator Technique
PNG - Pixel Value Differencing
Here we can catch 👉 nh4ttruong