From ee54d76769eacc85636bcb86ca8c35133ed33d99 Mon Sep 17 00:00:00 2001 From: Louis Date: Fri, 22 Dec 2023 09:25:09 +0100 Subject: [PATCH] docs: :pencil: Add things --- CSP Bypass/README.md | 3 +++ File injection/README.md | 2 ++ 2 files changed, 5 insertions(+) diff --git a/CSP Bypass/README.md b/CSP Bypass/README.md index 6bf2eef..5d402ba 100644 --- a/CSP Bypass/README.md +++ b/CSP Bypass/README.md @@ -1,3 +1,6 @@ +# CSP Bypass +The aim of this challenge is to bypass the CSP (Content Security Policy) to execute a script from an external source. + # Low ```javascript console.log("Welcome the the hacking word"); diff --git a/File injection/README.md b/File injection/README.md index 38bda9d..095f5c9 100644 --- a/File injection/README.md +++ b/File injection/README.md @@ -1,3 +1,5 @@ +# File injection +> The aim of this challenge is to inject a file to the server that execute a script. # Low Just upload the file `file-inject-low.png` and you will get the flag.