Beta
WeakStore
Loading description...
Security
View
This comment has been reported as {{ abuseKindText }}.
Show
This comment has been hidden. You can view it now .
This comment can not be viewed.
- |
- Reply
- Edit
- View Solution
- Expand 1 Reply Expand {{ comments?.length }} replies
- Collapse
- Spoiler
- Remove
- Remove comment & replies
- Report
{{ fetchSolutionsError }}
-
-
Your rendered github-flavored markdown will appear here.
-
Label this discussion...
-
No Label
Keep the comment unlabeled if none of the below applies.
-
Issue
Use the issue label when reporting problems with the kata.
Be sure to explain the problem clearly and include the steps to reproduce. -
Suggestion
Use the suggestion label if you have feedback on how this kata can be improved.
-
Question
Use the question label if you have questions and/or need help solving the kata.
Don't forget to mention the language you're using, and mark as having spoiler if you include your solution.
-
No Label
- Cancel
Commenting is not allowed on this discussion
You cannot view this solution
There is no solution to show
Please sign in or sign up to leave a comment.
I really enjoy this style of kata. Hope to see more from you!
Thank you very much for your feedback, it is valuable to me! I have a few ready-made ideas on the topic of information security in stock, so look forward to it soon)
Also, some standard hacks should be patched; there's already a solution that exploits the lack of such patching.
The kata linked in the below issue has most of the patching in Preloaded (fork the kata to see it).
Yes, I thought there were similar tricks that I missed. Now the hack you provided doesn't work.
Thank you so much for the fixes!!!
This comment has been hidden.
I have not seen before this kata, the link to which you gave. Besides, I wouldn't say it's a duplicate.
In the kata you have given, the researcher has a specific starting point. In my kata, there is a certain closed system that you need to play with in order to identify a vulnerability, and then you need to come up with / implement an algorithm that exploits the vulnerability found. The value of my kata lies precisely in the research that needs to be done.
I look forward to feedback.
Also, if you write briefly about the course of your thoughts during hacking, how you came to a decision, criticism and emotions that you experienced during this, it will be very important to me. It takes a lot of time to create, test and analyze a kata, and it's hard for me to do it without realizing that I'm doing something right. Thank you!