Exploitation guides

The following section covers the exploit guides for the scenarios created in this chapter. These are guidelines, and there are more ways to exploit the vulnerabilities.

Scenario 1 – decode-alypse now

There's no one way to say, "this is how you deal with encoding," so as with the previous chapter, these exploitation guides will largely be broad suggestions on how to behave with them.

The first thing to do is to see whether you can recognize the encoding type visually. Some are obvious and seen regularly, such as URL, HTML, and Base64 encoding. If you see binary and don't recognize it, you need to find a different job. If you can spot the type straightaway, good for you. Nab yourself a convertor (there are lots ...

Get Kali Linux CTF Blueprints now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.