TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WillYouHack.Me?

36 pointsby hansyalmost 11 years ago

9 comments

dwyeralmost 11 years ago
&gt; {user: &quot;aBlackDude&quot;, pass: &quot;12inches&quot;, flag: &quot;u&quot;}<p>Cool racism, bro.
评论 #7936120 未加载
评论 #7936391 未加载
q3kalmost 11 years ago
So this is like the hip, overhyped version of any [1] number [2] of [3] public [4] CTF [5] and [6] hackme [7] sites [8]?<p>1 - <a href="http://overthewire.org/wargames/" rel="nofollow">http:&#x2F;&#x2F;overthewire.org&#x2F;wargames&#x2F;</a><p>2 - <a href="http://www.hacker.org" rel="nofollow">http:&#x2F;&#x2F;www.hacker.org</a><p>3 - <a href="http://smashthestack.org" rel="nofollow">http:&#x2F;&#x2F;smashthestack.org</a><p>4 - <a href="http://3564020356.org" rel="nofollow">http:&#x2F;&#x2F;3564020356.org</a><p>5 - <a href="https://w3challs.com" rel="nofollow">https:&#x2F;&#x2F;w3challs.com</a><p>6 - <a href="http://sys.warchall.net" rel="nofollow">http:&#x2F;&#x2F;sys.warchall.net</a><p>7 - <a href="http://canyouhack.it" rel="nofollow">http:&#x2F;&#x2F;canyouhack.it</a><p>8 - <a href="http://www.microcontest.com" rel="nofollow">http:&#x2F;&#x2F;www.microcontest.com</a><p>(Seriously, there&#x27;s a ton)
评论 #7936339 未加载
markcampbellalmost 11 years ago
<p><pre><code> currentUser = users[2].user; function checkUserNameAndPass() { return true; }</code></pre>
wingerlangalmost 11 years ago
&gt; function decrypt(a){return &quot;a&quot;;}<p>notAdmin<p>a<p>&quot;Login complete, and notAdmin is Admin.&quot;<p>Reminds me of when I made a login-form in flash, that simply redirected the browser to &quot;hiddenLoggedIn.html&quot;. To be fair I was around 13.
评论 #7936429 未加载
drunkcatsdgafalmost 11 years ago
Surprised no one has really hacked you on godaddy.
im3w1lalmost 11 years ago
That&#x27;s an &quot;unconventional&quot; way of using the switch&#x2F;case construct. But it doesn&#x27;t seem to matter in this case. Intentional?<p>md5 of password is 44f02a78f5203c7c41463c75aba9e9cc.
loopdoendalmost 11 years ago
This only serves to illustrate why relying on obfuscation to protect you via security-through-obscurity is ridiculous. Commercial Javascript libraries with DRM should take note.
评论 #7936258 未加载
评论 #7936267 未加载
评论 #7936295 未加载
kevinschumacheralmost 11 years ago
Reminds me of hackthissite.org
评论 #7936179 未加载
johnlim5847almost 11 years ago
cool