4 MIN READ
Blog Post
netcat
Silver I
2 days ago"Although not required for this lab, you should always monitor operating and file system interactions and attempt to decompile the app to uncover all possible attack vectors." - Well, yes: Why didn't we have access to tools for static and dynamic analysis?
That way it would be possible to get the first two tokens, without connecting to the target.
- StefanApostol2 days ago
Immerser
I wanted this challenge to be more about the communication than static/dynamic analysis.