Denial of Service
Black Hat Library
Kafka - ZempRadio
Chat Network Activity
About how it works
View Score Board
This script is very very basic. You are to attempt the correct allowed linux command through a vulnerable php script. Created by: ps-aux
Same as Level 01, however, a filter has been added and you will need to figure out the proper piping. Created by: ps-aux
You will need to utilize the lessons you learned from level 01 and 02. Use these methods to attempt to find the hidden password file and crack it. Created by: ps-aux
You will be given a hex dump of an ecrypted file. Convert the hex dump in to the original binary format and decrypt it. Created by: ps-aux
You will need to be familiar with SQL Injection for this challenge. Using basic and properly crafted sql attempt to find the vulnerable column. Created by: ps-aux
Similiar to level 05. This time you will need to execute your SQL Injection from the vulnerable column you find. Created by: ps-aux
Stay in touch
You can follow us on the following social platforms:
Zempirians is a community effort. The only reason of it's growth and popularity is the people using and contributing to it.
Page accessed 3352 times (1%). Website accessed 251759 times (16303). Stats since 2013-06-27 20:05:36.