[Pentester Academy] Web Application Security Challenge 17
First i tried to insert “><h1>@exploitprotocol</h1><xss input=” in Email and password but it was stripping the value’s so i thought …
First i tried to insert “><h1>@exploitprotocol</h1><xss input=” in Email and password but it was stripping the value’s so i thought …
Challenge-16 HTML Injection 1 This was a simple one just input “><h1>@exploitprotocol</h1><xss input=” in Email field.
First I downloaded the pcap file the using tcpxtract i extracted all the files from pass.pcap file What i found …
First I Downloaded the file from the Challenge Page… then i unzipped https.zip file using command – unzip https.zip … …
This Challenge was one of the good challenges i have seen on this site till now. below is the snip …
First I Intercepted the request using Burp Proxy… then response say’s to set session-id value to 1049 ………i request the …
When I first opened the page there was no kind of login or authoriztion …so, i intercepted the request using …
This is a very simple kind of challenge with basic authorization.It uses POST method to send the request with a …
In this Challenge Intially there is a login form in which we have enter username “@pentesteracademy.com”+ and password and in the …
As I Have Got some holiday’s, i thought to do something interesting .So i thought why not solve Pentester Academy …