Training: Crypto – Transposition I

Crypto – Transposition Explain It seems that the simple substitution ciphers are too easy for you. From my own experience I can tell that transposition ciphers are more difficult to attack. However, in this training challenge you should have not much problems to reveal the plaintext. Ciphertext oWdnreuf.lY uoc nar ae dht eemssga eaw yebttrew eh nht eelttre sra enic roertco drre . Ihtni koy uowlu dilekt  oes eoyrup sawsro don:wp ropglddpel.f 여러가지 암호화 기법이 있지만, 이를 복호화 하기 위해선 첨부된 http://en.wikipedia.org/wiki/Transposition_cipher에서 …

[WeChall]Training: MySQL II

[WeChall]Training: MySQL II[link] 문제 This one is the same as MySQL1, but you have to come up with a more advanced injection to trick this authentication. Your mission is again: Login yourself as admin. Again you are given the sourcecode, also as highlighted version. 번역 이것은 MySQL1과 동일하지만, 이 인증을 속이기 위해선 진보된 인젝션이 필요합니다. …

[WeChall]Training: MySQL I

[WeChall]Training: MySQL I[link] 문제 This one is the classic mysql injection challenge. Your mission is easy: Login yourself as admin. Again you are given the sourcecode, also as highlighted version. 번역 이것은 고전적인 mysql 인젝션 챌린지입니다. 당신의 임무는 쉽습니다: 관리자로 로그인하십시오. 그리고 소스 코드 와  하이라이트 버전으로 소스 코드가 제공됩니다. Query $query = “SELECT * …

[WeChall]No Escape

[WeChall]No Escape[link] 문제 The small gizmore software company is expanding, and got contracted to create the new online votings for presidental election in 2012. The current script is in alpha phase, and we`d like to know if it`s safe. To prove me wrong you have to set the votecount for at least one of the …