Have you ever wanted to become a hacker or to experience the thrill when you gain root access on a government vulnerable server? I always thought security was the
Run a CTF event using CTFd - import and export challenges in a portable, human-readable format (YAML).
This tutorial will describe how you can use the MitM attack to alter the default behaviour of a mobile application. As result, the application will return all its remote