UMD CTF Web Exploitation


Challenge Problem : “We are now in the system! Looks like the developers are still there, now we just need to find the key so we can create more user accounts, so our team can steal all the signs!“ When we login into the given domain, we can immediately spot an LFI vulnerability in […]