تقييمات الطلاب
( 5 من 5 )
١ تقييمات
فيديو شرح Session ID Hijacking With Python OverTheWire Natas 18-19 ضمن كورس اختبار اختراق المواقع شرح قناة Motasem Hamdan Cyber Security & Tech، الفديو رقم 4 مجانى معتمد اونلاين
In this video-walkthrough, we covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the session ID no longer generated sequentially and in the new challenge, the session ID is generated using a range of numbers from 1 to 640 and then combined with the username used to login and lastly the final string is hex encoded. Using python scripting were able to identify the pattern used in creating the session ID and find the one associated with the admin account.
Writeup
https://motasem-notes.net/session-id-hijacking-with-python-overthewire-natas-19-20/
OverTheWire Natas Level 18-19
https://overthewire.org/wargames/natas/natas19.html
Patreon
https://www.patreon.com/motasemhamdan?fan_landingtrue
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA