Présentation du plugin Le plugin Valz Display Query Filters se présente de cette façon : This plugin, once activated, spits out the information passed by each filter used in manipulating datab...
Présentation du plugin Le plugin NanoSupport — Support Ticketing & Knowledgebase for WordPress (slug: nanosupport) se présente de cette façon : Create a fully featured Support Center withi...
Présentation du plugin Le plugin Multipurpose CSS3 Animated Buttons se présente de cette façon : Multipurpose CSS3 Animated Buttons allow you to select between social media buttons or your own...
Présentation du plugin Le plugin Webmention se présente de cette façon : A Webmention is a notification that one URL links to another. Sending a Webmention is not limited to blog posts, and ca...
Baking Description Do you know how to make cookies? How about HTTP flavored? Solution You are given a URL to a webapp that looks like an oven. You can click several buttons, and it will pu...
Land Before Time Description This trick is nothing new, you know what to do: iSteg. Look for the tail that’s older than time, this Spike, you shouldn’t climb. Solution LSB (Least Significan...
Babel Description It’s babel! Just a bunch of gibberish, right? Solution This is not gibberish. This is a C# source code which has been a little bit obfuscated : using System; using System...
Batchfuscation Description I was reading a report on past Trickbot malware, and I found this sample that looks a lot like their code! Can you make any sense of it? Solution We are given a b...
Description For this challenge, you can connect into a PowerShell Core instance. Note that this is running out of a Linux-based Docker container, so you do not have a full-blown Windows operati...
Backdoored Splunk Description You’ve probably seen Splunk being used for good, but have you seen it used for evil? NOTE: the focus of this challenge should be on the downloadable file below...
Une nouvelle version du contenu est disponible.