PHC - Korra
Honorary Poster
- Joined
- Oct 10, 2016
- Posts
- 399
- Reaction
- 170
- Points
- 199
Included in the NVAP (Network Vulnerability Attack / Assessment Platform) will be the Privilege of the H@ckers to execute the following Commands with a Session User in place under my Website, With a Separate Database in place..
1st Round: SQL Injection via SQL Exploits.
2nd Round: Remote File Inclusion or RFI.
3rd Round: Port Mapping or Port Scanning.
4th Round: Data Tampering or File Upload Attack.
5th Round: Kerberos Session Attack Vector with SSH Honeypot.
6th Round: Malware Payload HTTP Requests Attack.
7th Round: Meterpreter, or Session Polymorph Attack.
Winners will be announced and granted a recruitment into my Website as a Developer.
Note: Hindi po ito H@cking Contest; Programming + Dev Ops / Slight H@cking.
Including in the Website is a Google-like Interview.
- ( C ) PHC - Korra
1st Round: SQL Injection via SQL Exploits.
2nd Round: Remote File Inclusion or RFI.
3rd Round: Port Mapping or Port Scanning.
4th Round: Data Tampering or File Upload Attack.
5th Round: Kerberos Session Attack Vector with SSH Honeypot.
6th Round: Malware Payload HTTP Requests Attack.
7th Round: Meterpreter, or Session Polymorph Attack.
Winners will be announced and granted a recruitment into my Website as a Developer.
Note: Hindi po ito H@cking Contest; Programming + Dev Ops / Slight H@cking.
Including in the Website is a Google-like Interview.
- ( C ) PHC - Korra