Hello again!, after a long time. Today I'm going to share with you a Compiled Python File (.pyc) crackme which is avaiable in root-me.org. This is my first experience with pyc files in reversing because we talk about them rarely in this area. Here is the challenge : https://www.root-me.org/en/Challenges/Cracking/PYC-ByteCode It suggests to retrieve the password... Continue Reading →
Several years ago (when I was grade 7 I guess) my parents gifted this dictionary to someone. It's still available here! There is a regular book + CD bundle. I kept a copy of that CD to use myself. But after that hoops.. It required a password which is randomly generate from their database to... Continue Reading →
Actually we can do lots of different things with XSS ; thought we always pop-up a message! Anyway that's enough for concept proofing rather than do more practically. Here, I'm gonna show you how to exploit a cross site scripting vulnerability successfully using another social networking service. Finally, If someone view my profile, automatically he... Continue Reading →
I saw 'eFront eLearning CMS' in bugcrowd list and while I was walking around in their web application I identified their HTML forms do not filter user inputs properly. So I reported! 😉 Visit bug forum : http://forum.efrontlearning.net/viewtopic.php?f=5&t=11439&sid=f3d9a16683814dd6137c4d14b214ee63
I’m writing this post on the request of @rudr4_sarkar. This is a very simple patch in which you can open multiple instances of wmplayer. It basically uses the ‘CreateMutexW’ API to create a mutex object with the string “LocalMicrosoft_WMP_70_CheckForOtherInstanceMutex”.
The pseudo code would be something like this
You just need to patch the ‘jmp’ instruction 🙂
View original post 91 more words