tag:blogger.com,1999:blog-8601133831815091251.post6793557918502568622..comments2024-01-16T18:34:26.259+00:00Comments on Skeleton Scribe: Hackxor hacking game betaJames Kettlehttp://www.blogger.com/profile/03270155456684307605noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-8601133831815091251.post-707794371754502502011-04-01T10:29:32.968+01:002011-04-01T10:29:32.968+01:00I was thinking dinoxorI was thinking dinoxorJames Kettlehttps://www.blogger.com/profile/03270155456684307605noreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-57876639588139113772011-03-31T20:59:33.169+01:002011-03-31T20:59:33.169+01:00Hackxor. HACKXOR? Will the sequel be called Chainx...Hackxor. HACKXOR? Will the sequel be called Chainxor?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-47056234892478654932011-03-07T17:38:53.100+00:002011-03-07T17:38:53.100+00:00Thank you, I will give it a try while waiting for ...Thank you, I will give it a try while waiting for your hint document ;-)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-45400390361407133972011-03-07T16:13:01.999+00:002011-03-07T16:13:01.999+00:00I will release a hint document with the final vers...I will release a hint document with the final version of hackxor (in a month or two). No walkthroughs :)<br /><br />If you haven't already tried it I recommend the OWASP ; <a href="http://www.owaspbwa.org/" rel="nofollow">broken web apps collection</a> <br /><br />It's similar to hackxor but much easier to learn from.James Kettlehttps://www.blogger.com/profile/03270155456684307605noreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-561859337163478082011-03-05T17:29:43.265+00:002011-03-05T17:29:43.265+00:00An hint document or walkthrough would be nice, I r...An hint document or walkthrough would be nice, I realized that this game is too hard for me but I still want to learn something.<br /><br />Thank you albinoAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-50197858929792731582011-02-06T15:14:25.256+00:002011-02-06T15:14:25.256+00:00The attack log you're provided with has severa...The attack log you're provided with has several useful pieces of information in it. Try looking up information on HTTP request headers, particularly the Referrer header.James Kettlehttps://www.blogger.com/profile/03270155456684307605noreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-14990011464751509612011-02-06T12:08:38.656+00:002011-02-06T12:08:38.656+00:00Any hint to get started?
I'm not an expert and...Any hint to get started?<br />I'm not an expert and I'm stuck right at the beginning :-)<br /><br />Thanks for this hacking game, I have a lot of exercise to do.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8601133831815091251.post-11128123593535427782011-02-02T16:58:28.909+00:002011-02-02T16:58:28.909+00:00Nice !
I have started the download, this should be...Nice !<br />I have started the download, this should be fun.<br />It is high time I learned something new.<br />Thanks albinoAbhisek Sanyalhttps://www.blogger.com/profile/03484181296246017591noreply@blogger.com