Penetration Testing 1, DoS hint
The article gives the hints of overflowing which is similar to that of a numeric calculator. It can't be divide by zero, since that raises an exception, so I tried entering a large amount of data in all the fields.
The article says 'overlow the connection', but I'm not sure what that means. I'm sure this challenge has nothing to do with literally DoSing the page with multiple requests.
The article asks us look for information shared between pages, so I put news=<very large string>, but the server complained saying that URL was too large. I set the PHPSESSID to the large string, and as expected, I logged out. Any hints?
P.S. I don't understand how I used the cookie exploit clearly. Can I PM someone to ask how it works?
In a lot of challenge, the aim is to put the good string where it is needed. Using a DoS software, or trying to DoS the server can't be the good way to valid the challenge =] So, you have to remember there a script to add your points, like this:
if ( $variable == "answer" ) { // only an example give_points(); }
It should be more difficult to analyze a real attack :ninja: and to give points…