Taipei - normal port knocking
nmap -p- --min-rate=1000 -T4 localhost
Unimak - json parsing
jq '.data.stations[] | select(.has_kiosk==false and .capacity>30) | .station_id' station_information.json > ~/mysolution
Ivujivik - csv parsing
find out the row first run without try - error - and catch it
Monaco
# - get the POST field
curl localhost:5000
# format with
curl -X POST -F 'password=PASSWORD' http://localhost:5000/
git restore ./
cat webserver.py
#locate the password location
ps aux | grep python
# find the pid
cat /proc/1234/environ | grep SUPERSECRETPASSWORD
get the env
format and post it
pretty cool about /proc tricks. you can even see a background progress stderr/stdout with
cat /proc/1444/fd/{1,2}




