Exploitation guides

The following section covers the exploit guides for the scenarios created in this chapter. These are guidelines, and there are more ways to exploit the vulnerabilities.

Scenario 1 – decode-alypse now

There's no one way to say, "this is how you deal with encoding," so as with the previous chapter, these exploitation guides will largely be broad suggestions on how to behave with them.

The first thing to do is to see whether you can recognize the encoding type visually. Some are obvious and seen regularly, such as URL, HTML, and Base64 encoding. If you see binary and don't recognize it, you need to find a different job. If you can spot the type straightaway, good for you. Nab yourself a convertor (there are lots online if you don't ...

Get Kali Linux CTF Blueprints now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.