How to hack "smasher2"​ on | by Davy Rogers


How to hack "smasher2"​ on  Introduction This was a frustrating and interesting challenge, there were parts of it that I really enjoyed and found very useful, and then there were brute force obstacles which I generally don't like but are unfortunately a requirement in a number of situations. Disclaimer: The following activities were conducted in a lab environment with permission from the server owners. These techniques should not be used for any illegal activity under any circumstances. What's covered in this article This is a technical write-up describing how I approached attacking 'smasher2' on The article probably won't contain all the attack vectors and may differ from the official write-up (available on In this article we will cover; Brute forcing a web directory HTTP Basic Authentication Bypass DNS Enumeration to find hidden subdomains Code analysis of a Python Flask application Writing a proof of concept exploit Reverse....

February 12, 2020
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.