<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Password on mytty</title>
    <link>https://mytty.org/tags/password/</link>
    <description>Recent content in Password on mytty</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>Except where otherwise noted, content on this site is created by Richard Sammet and&lt;br&gt; licensed under a &lt;a href=http://creativecommons.org/licenses/by/4.0/&gt;Creative Commons Attribution 4.0 International License&lt;/a&gt;.</copyright>
    <lastBuildDate>Thu, 15 Aug 2019 17:42:42 +0000</lastBuildDate>
    
	<atom:link href="https://mytty.org/tags/password/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>TYS 0x07 - onebyte to rule them all</title>
      <link>https://mytty.org/posts/tys_0x07_onebyte/</link>
      <pubDate>Thu, 15 Aug 2019 17:42:42 +0000</pubDate>
      
      <guid>https://mytty.org/posts/tys_0x07_onebyte/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This post is part of the Test Your Skills series. You can find an introduction &lt;a href=&#34;https://mytty.org/projects/tys/&#34;&gt;here&lt;/a&gt;. And an overview of all TYS&amp;rsquo;s currently available is over &lt;a href=&#34;https://mytty.org/tags/tys/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr /&gt;

&lt;h4 id=&#34;challenge&#34;&gt;Challenge&lt;/h4&gt;

&lt;p&gt;The goal of this challenge is to write a script/tool/exploit which successfully bypasses the login of the network enabled service running in the provided docker container - without changing the docker run command (run it exactly the way as shown below) or any of the scripts/files provided.
Feel free to explore the container and take a closer look at the application binary.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>