<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>NahamCon 2022 on Jack Taylor</title><link>https://jacktaylor.tech/tags/nahamcon-2022/</link><description>Recent content in NahamCon 2022 on Jack Taylor</description><generator>Hugo</generator><language>en</language><managingEditor>jack@jacktaylor.tech (Jack Taylor)</managingEditor><webMaster>jack@jacktaylor.tech (Jack Taylor)</webMaster><lastBuildDate>Sun, 01 May 2022 10:53:18 +0900</lastBuildDate><atom:link href="https://jacktaylor.tech/tags/nahamcon-2022/index.xml" rel="self" type="application/rss+xml"/><item><title>NahamCon 2022 CTF Write-up: Flaskmetal Alchemist</title><link>https://jacktaylor.tech/2022/05/nahamcon-2022-ctf-write-up-flaskmetal-alchemist/</link><pubDate>Sun, 01 May 2022 10:53:18 +0900</pubDate><author>jack@jacktaylor.tech (Jack Taylor)</author><guid>https://jacktaylor.tech/2022/05/nahamcon-2022-ctf-write-up-flaskmetal-alchemist/</guid><description>&lt;p&gt;One of the most fun challenges in NahamCon 2022 was Flaskmetal Alchemist. This
is a medium web challenge that involves an SQL injection that is relatively
easy to spot, but tricky to exploit. I learned a few new things from this, so
hopefully this write-up will provide inspiration to all you reading this. In
this post I will walk you through my thought process and how I eventually
exploited the vulnerability.&lt;/p&gt;</description></item></channel></rss>