4 MIN READ
Blog Post
netcat
Silver I
2 days ago"Although not required for this lab, you should always monitor operating and file system interactions and attempt to decompile the app to uncover all possible attack vectors." - Well, yes: Why didn't we have access to tools for static and dynamic analysis?
That way it would be possible to get the first two tokens, without connecting to the target.
StefanApostol
Immerser
2 days agoI wanted this challenge to be more about the communication than static/dynamic analysis.