Open ghost opened 8 years ago
Nice, someone took up your task and found a vuln in the 2nd iteration of the captcha though. After the 2nd iteration where randomisation of fonts was implemented, someone realised one of the fonts were a blank sample that just rendered it into normal ascii.
I don't think I even bothered to try breaking your captcha multiple times to find the normal ASCII. Honestly, the number 1 killer of all bots is captcha, which if I do face, I usually weight the pros and cons of having to code a separate module to take care of the captcha, in which case since the workshop was only 2 days, wasn't really worth the time.
I'm not too sure but who was the someone who took up my task? I'm assuming they didn't exploit it like I did and flooded your 40GB DigitalOcean server with nicely generated files... :D
Hm, you only managed about 40% of the disk size though. According to repquota and df anyway.
Really? I watched my own script fill your hdd up through a 'watch "df"'
On 25 Aug 2016 01:23, "amon" notifications@github.com wrote:
Hm, you only managed about 40% of the disk size though. According to repquota and df anyway.
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/nnamon/ctf101-systems-2016/issues/2#issuecomment-242143854, or mute the thread https://github.com/notifications/unsubscribe-auth/AUGnAb-XhdJTsef3XGtO4eUPoUk8rYAOks5qjH4OgaJpZM4JrwrI .
I'm the disk space guy. Good work with the captcha there, I didn't really want to spend too much resources on working up OCR for it so... ggwp :)