<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability &#8211; M. Ștefan Cristian</title>
	<atom:link href="/tag/vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Infosec engineer navigating the digital &#38; analog realms</description>
	<lastBuildDate>Tue, 10 May 2022 16:08:12 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>/wp-content/uploads/2021/10/icon.png</url>
	<title>vulnerability &#8211; M. Ștefan Cristian</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>UNbreakable CTF 2022 (individual) Writeups</title>
		<link>/2022/05/08/unbreakable-ctf-2022-individual-writeups/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Sun, 08 May 2022 22:52:45 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#CTF]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">/?p=609</guid>

					<description><![CDATA[This contest phase took place between 6th &#8211; 8th of May 2022 and had 165 active participants (from both Romania<p><a href="/2022/05/08/unbreakable-ctf-2022-individual-writeups/" class="more-link">Continue reading<span class="screen-reader-text">UNbreakable CTF 2022 (individual) Writeups</span></a></p>]]></description>
										<content:encoded><![CDATA[
<div class="wp-block-cover" style="min-height:463px;aspect-ratio:unset;"><span aria-hidden="true" class="wp-block-cover__gradient-background has-background-dim"></span><img fetchpriority="high" decoding="async" width="1250" height="833" class="wp-block-cover__image-background wp-image-612" alt="" src="/wp-content/uploads/2022/05/CTF_img.png" style="object-position:46% 50%" data-object-fit="cover" data-object-position="46% 50%"/><div class="wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow">
<p class="has-text-align-center has-small-font-size"><code><em>UNR 22</em></code></p>
</div></div>



<hr class="wp-block-separator"/>



<p>This contest phase took place between 6<sup>th</sup> &#8211; 8<sup>th</sup> of May 2022 and had 165 active participants (from both Romania and Republica Moldova).</p>



<p>I managed to get the <strong>14<sup>th</sup></strong> place, or <strong>10<sup>th</sup></strong> place for my category (university). All the official ranks can be found here: <a href="https://unbreakable.ro/clasament" target="_blank" rel="noreferrer noopener">https://unbreakable.ro/clasament</a>. <br>Even though this was the <em>individual</em> phase, I have to congratulate my two teammates (and faculty colleagues), <strong>Noria</strong> and <strong>Toma</strong>, who managed to get the <strong>1<sup>st</sup></strong> and <strong>2<sup>nd</sup></strong> place respectively. GG.</p>



<p>However, even though I had a busy weekend, I still solved <strong>80%</strong> of the given challenges. The writeups can be found below.</p>



<iframe width="1999" height="1200" src="https://drive.google.com/file/d/1ssC1KX-Jg0cEWgPpC4RrVFaUtfX0EeWD/preview" allow="autoplay"></iframe>



<hr class="wp-block-separator"/>



<div class="wp-block-image is-style-default"><figure class="aligncenter size-full is-resized"><img decoding="async" src="/wp-content/uploads/2022/05/ae444f90-9c60-11eb-b4a2-87f5b1a33560.png" alt="" class="wp-image-618" width="831" height="588"/></figure></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SQL Injections showcase</title>
		<link>/2021/10/06/sql-injections-showcase/</link>
		
		<dc:creator><![CDATA[spurge]]></dc:creator>
		<pubDate>Wed, 06 Oct 2021 20:43:49 +0000</pubDate>
				<category><![CDATA[Information security]]></category>
		<category><![CDATA[#badstore]]></category>
		<category><![CDATA[#cybersecurity]]></category>
		<category><![CDATA[#hack]]></category>
		<category><![CDATA[#loginbypass]]></category>
		<category><![CDATA[#SQLinjection]]></category>
		<category><![CDATA[#webvulnerability]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">/?p=137</guid>

					<description><![CDATA[This is my winning solution for a faculty SQL Injection contest I participated in 2021. The main challenge was to<p><a href="/2021/10/06/sql-injections-showcase/" class="more-link">Continue reading<span class="screen-reader-text">SQL Injections showcase</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>This is my winning solution for a faculty <span style="color:#149414" class="has-inline-color"><em>SQL Injection</em> contest</span> I participated in 2021.</p>



<p>The main challenge was to find <em>inventive and playful</em> ways to <span style="color:#149414" class="has-inline-color">exploit</span> database connected applications that are <span style="color:#149414" class="has-inline-color">vulnerable</span> to this kind of attack. </p>



<p>Therefore, I used two applications: <a rel="noreferrer noopener" href="https://github.com/StefanCsPurge/Web-Programming/tree/main/9%20SHCarsWebsite_-_Angular_ASP_NET_API" data-type="URL" data-id="https://github.com/StefanCsPurge/Web-Programming/tree/main/9%20SHCarsWebsite_-_Angular_ASP_NET_API" target="_blank">one that was entirely coded by me</a>, and the other being a vulnerable webservice hosted on a Linux server. It was fun <span style="color:#149414" class="has-inline-color">( ͡° ͜ʖ ͡°)</span> .</p>



<p>Below is the complete description of the exploitation process / write-up.</p>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-791x1024.jpg" alt="" class="wp-image-151" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0001.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-791x1024.jpg" alt="" class="wp-image-152" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0002.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="791" height="1024" src="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-791x1024.jpg" alt="" class="wp-image-153" srcset="/wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-791x1024.jpg 791w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-232x300.jpg 232w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-768x994.jpg 768w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003-1187x1536.jpg 1187w, /wp-content/uploads/2021/10/completeDescriptionSQLInj_page-0003.jpg 1275w" sizes="(max-width: 791px) 100vw, 791px" /></figure>



<figure class="wp-block-image alignwide size-large"><img loading="lazy" decoding="async" width="1024" height="678" src="/wp-content/uploads/2021/10/ALL_DB_schema-1024x678.png" alt="" class="wp-image-147" srcset="/wp-content/uploads/2021/10/ALL_DB_schema-1024x678.png 1024w, /wp-content/uploads/2021/10/ALL_DB_schema-300x199.png 300w, /wp-content/uploads/2021/10/ALL_DB_schema-768x508.png 768w, /wp-content/uploads/2021/10/ALL_DB_schema.png 1511w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>DB schema</figcaption></figure>



<p>The Github repo for this solution can be found <a href="https://github.com/StefanCsPurge/Databases/tree/main/SQL%20Injections%20showcase" data-type="URL" data-id="https://github.com/StefanCsPurge/Databases/tree/main/SQL%20Injections%20showcase" target="_blank" rel="noreferrer noopener">here</a>.</p>



<p>The above PDF and video demo can be found <a href="https://drive.google.com/drive/folders/1svT-g4Nj4H5FY8-KSorNLEh5p0738txr" data-type="URL" data-id="https://drive.google.com/drive/folders/1svT-g4Nj4H5FY8-KSorNLEh5p0738txr" target="_blank" rel="noreferrer noopener">here</a>. </p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
