출처: http://vallista.tistory.com/entry/Syntax-Highlighter-티스토리에서-코드-이쁘게-넣기 [VallistA]>

posted by ddanss 2019. 9. 3. 09:36
728x90

어떻게푸나...했더니

매직해시 취약점이라고 한다

https://www.whitehatsec.com/blog/magic-hashes/

 

Magic Hashes | WhiteHat Security

For more than the last decade, PHP programmers have been wrestling with the equals-equals (==) operator. It’s caused a lot of issues. This has a particular implication for password hashes. Password hashes in PHP are base16 encoded and can come in the form

www.whitehatsec.com

 

여기에 답이 나와있다..

언젠간 이해하지않을까ㅠㅠㅠㅠ

반응형

'ctf 및 여러가지 문제들 > HackCTF' 카테고리의 다른 글

HackCTF - Input Check  (0) 2019.09.03
HackCTF - Time  (0) 2019.09.03
HackCTF - Login  (0) 2019.09.02
HackCTF - BabyMIPS  (0) 2019.09.01
HackCTF - Basic_FSB  (0) 2019.08.31