Young hacker smiling
Computer with four padlocks, one unlocked

Dude, where’s my XSS protection?

Solving Halls of Valhalla Challenge: XSS4
Quill icon Juan Aguirre   Folder icon challenges   Tag icon xss,  web,  protect,  challenge

Web application security is a major concern nowadays. You have to make sure your application is secure, especially if you have a lot of users. There are many controls a developer can implement to attempt to make the site safer. Or so they think. The fun of hacking is looking …



Yellow puzzle missing one piece, shown in red

Reversing for mortals

Solving Yoire crackme average challenge
Quill icon Juan Aguirre   Folder icon attacks   Tag icon revert,  challenge,  engineering

It’s hard to really know where to start when you’re new to hacking. When I first started to get into the hacking world I came across something called Reverse Engineering, the art of de-constructing some product followed by a detailed analysis and revision of its composition and its …



Hand touching the Wireless icon

Stupid neighbours using WEP

Solving Yashira WEP Security challenge
Quill icon Juan Aguirre   Folder icon attacks   Tag icon wep,  wifi,  encryption,  challenge

Wi-Fi security has not always been the best. The first attempt at securing Wi-Fi access points was termed Wired Equivalent Privacy (WEP). WEP is a security algorithm that was implemented on IEEE 802.11 wireless networks. The original 802.11 wireless standard was ratified in 1997 to include this enhancement …



Pyramids in the desert

Types of triangles

Solving CodeAbbey Pythagorean Theorem challenge
Quill icon Jonathan Armas   Folder icon challenges   Tag icon pythagoras,  code,  challenge,  solve

A triangle is a 3-sided polygon sometimes (but not very commonly) called the trigon. Every triangle has three sides and three angles, some of which may be the same. The sides of a triangle are given special names in the case of a right triangle, with the side opposite the …



Magnifying glass finding password in a set of binary data

Storing passwords safely

Solving Yashira hash challenge 3
Quill icon Jonathan Armas   Folder icon challenges   Tag icon password,  security,  challenge

By the end of the year, we witnessed a huge increase in the amount of attacks that extracted large quantities of personal information, emails and passwords. Even one of the biggest email services, Yahoo, suffered an attack by cyber-criminals and they robbed more than 500000 accounts, in doing so, accessing …



Service status - Terms of Use