Beta

WeakStore

Description
Loading description...
Security
  • Please sign in or sign up to leave a comment.
  • textninja Avatar

    I really enjoy this style of kata. Hope to see more from you!

    • Alexander-jsdev Avatar

      Thank you very much for your feedback, it is valuable to me! I have a few ready-made ideas on the topic of information security in stock, so look forward to it soon)

  • Voile Avatar

    Also, some standard hacks should be patched; there's already a solution that exploits the lack of such patching.

    The kata linked in the below issue has most of the patching in Preloaded (fork the kata to see it).

  • Voile Avatar

    This comment has been hidden.

    • Alexander-jsdev Avatar

      I have not seen before this kata, the link to which you gave. Besides, I wouldn't say it's a duplicate.

      In the kata you have given, the researcher has a specific starting point. In my kata, there is a certain closed system that you need to play with in order to identify a vulnerability, and then you need to come up with / implement an algorithm that exploits the vulnerability found. The value of my kata lies precisely in the research that needs to be done.

      Issue marked resolved by Alexander-jsdev 2 years ago
  • Alexander-jsdev Avatar

    I look forward to feedback.

    Also, if you write briefly about the course of your thoughts during hacking, how you came to a decision, criticism and emotions that you experienced during this, it will be very important to me. It takes a lot of time to create, test and analyze a kata, and it's hard for me to do it without realizing that I'm doing something right. Thank you!