By Amit GhoshFeb 230
Decrypting Xecryption Algorithm You have to simply read about XECryption and then have to draw out a solution by writing a program and decrypt the code and...
By Amit GhoshFeb 231
Sql Injection Method This page involves utilizing a SQL Injection Attack. If you have observed the source code you have noticed that which leads us to a page...
By Amit GhoshFeb 231
Sql Injection Method It can be better said as query string manipulation. A Query-string is any data in the URL that appears after the page name which will be...
By Amit GhoshMar 290
Url http://artretreat.org/amit/quiz/v1/ Ok, as you are seeing it; it is a work in progress website. It works like this way. There are 25 questions and there...