https://lab.wallarm.com/php-remote-code-execution-0-day-discovered-in-real-world-ctf-exercise/?fbclid=IwAR3KP6XpSEQfwVWCsVDI1YigAbd2jGacF4v2U_8CECT5wQkkH0LWALlEJW8

 

PHP Remote Code Execution 0-Day Discovered in Real World CTF Exercise - Wallarm Blog

An unusual PHP script was found during an hCorem Capture the Flag task, revealing millions of everyday users are vulnerable to attack. Learn the deep tech.

lab.wallarm.com

 

We all know that Capture the Flag (CTF) tasks are synthetic. They are designed as games or puzzles for security professionals to solve in order to hone, demonstrate, and add skills.  It’s like merging chess, a maze, and a physically challenging 10K obstacle course, but for security aficionados.

“Computer security represents a challenge to education due to its interdisciplinary nature… Attack-oriented CTF competitions try to distill the essence of many aspects of professional computer security work into a single short exercise that is objectively measurable. The focus areas that CTF competitions tend to measure are vulnerability discovery, exploit creation, toolkit creation, and operational tradecraft.”

Trail of Bits on GitHub

 

블로그 이미지

wtdsoul

,