Author | Post | |||
velo![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
@Erik & tbs: If some exploit is "down" why it is not moved out from the list of exploit challenges? |
|||
![]() |
|
|||
Gome![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
It's down because you can see the answer of the SQL injection with use of RHC3. GoMe |
|||
![]() |
|
|||
Erik![]() ![]() ![]() ![]() ![]() |
Really? How is this possible? I can't imagine what's so difficult. Well I'll ask TheBlacksheep when he's online. |
|||
![]() |
|
|||
Gome![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
well i thought that was the reason. not sure though. ![]() ![]() |
|||
![]() |
|
|||
r3d5pik3![]() ![]() |
yah that was the reason |
|||
![]() |
|
|||
theblacksheep![]() ![]() ![]() ![]() ![]() ![]() ![]() |
with the rhc that is down you were able to see all files on the server and also the source + solution for the sql one. i have holidays for 3 more weeks and then i will fix it. |
|||
![]() |
|