Knowledge Base

This section will contain any materials that are not considered to be challenges.

Bypassing Router’s Access Control List (ACL)

This post demonstrates how to bypass your home router access control list. In turn, accessing the internet will be possible even if your device is being blocked by the router.


This post contains a very basic view on MySQL Injection. This topic will be expanded and updated in the future with other methodologies of exploiting these types of flaws.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s