You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
So you have made it so far where you have successfully hacked into the database by fetching and merging the required files.
Now you must be having a file named encrypt.txt. It is a file containing random characters encodings about the database. However all databases have vulnerabilities wherein a certain part of the data is not encrypted for further easy updates that need to be rolled out. You need to find a vulnerability in the given text file.
You are certain that the vulnerability involves "Deanu". Search for "Deanu".
Hacks
Make a new branch Defiance from the previous branch.
Keep adding valid screenshots to a doc file that show the different changes you made.
Convert the doc file to a PDF and add it to this branch in the repo.
Send a PR after changing and committing the above changes.
The PR should contain the modified text file and the newly created PDF file.
So you have made it so far where you have successfully hacked into the database by fetching and merging the required files.
Now you must be having a file named encrypt.txt. It is a file containing random characters encodings about the database. However all databases have vulnerabilities wherein a certain part of the data is not encrypted for further easy updates that need to be rolled out. You need to find a vulnerability in the given text file.
You are certain that the vulnerability involves "Deanu". Search for "Deanu".
Hacks
Defiance
from the previous branch.For users in MacOS / Linux :
Use the grep command for searching for the vulnerability :
For users in Windows :
Use the findstr command for searching for the vulnerability :
Make changes to the above vulnerability. Change the vulnerability to KP WAS HERE.
For users in MacOS / Linux :
Use the sed command for finding and replacing for the vulnerability :
sed -i 's/original_word/new_word/g' filename_here.txt
For users in Windows (Seriously consider switching to Linux/ MacOS) :
Use the findstr command for searching for the vulnerability :
grep
or thefindstr
command. Attach the screenshot of the change in the doc file.The text was updated successfully, but these errors were encountered: