A Competitive Hacking Platform (CTF) involving different types of attacks and bypassing mechanism to infiltrate the system. There are total 7 stages and with every stage there is a new challenge involving some different kind of hacking technique.
#Source Code Analysis #Steganography #Authentication Bypassing #Cross-site scripting (XSS - Reflected - Easy) #Cross-site scripting (XSS - Reflected - Hard) #SQL Injection #File Upload Vulnerability
- Admin Panel
- Leaderboard
- Move the files to your web server.
- Create a DB "hck".
- Import "hck.sql" to "hck" DB.
- Create two users for MySQL DB. i) testAdmin:aA1@admin Admin - root privilages. ii) testUser:aA1@testUser Participant - privilage to only read data (i.e. only for select statements).
- Ready to GO.