This section will contain any materials that are not considered to be challenges.
This post demonstrates how to bypass your home router access control list. In turn, accessing the internet will be possible even if your device is being blocked by the router.
This post contains a very basic view on MySQL Injection. This topic will be expanded and updated in the future with other methodologies of exploiting these types of flaws.