

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1


There’s no place like 127.0.0.1

WaRWolFz crew


I just realised I missed out a fairly important piece of information :p you need to try and login as the user ‘memtash’.




There’s no place like 127.0.0.1

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1



*stares at the source code…………
I know @dloser already know the solution…. He’s just… Letting us to be the first







@1337boy Real 8 ???





With a satelite integrated system
No… Not a satelite…. A lot of satelite
And dont forget a giant spacestation with some of his server inside



It’s funny because at this point it is difficult to tell what a spoiler would be to the challenge.


I’m just gonna leave this here, lol…
http://codereview.stackexchange.com/questions/133937/is-this-php-code-vulnerable-to-some-attack
The first sentence both makes me smile and cry at the same time: “So I’ve made a PHP code for a login form. But i am not sure if this code was that safe, because i am not a security expert.”.


You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1

?

@Mugiwara27, I found it to be the third hit on google when searching for “md5(openssl_random_pseudo_bytes(32)); vulnerability” ;).
Was just googling for the inner working of pieces of the code, since my coding and code review skills are awfull.. :p


Roses are red,
Violets are blue,
AES(level) is bad
And I might be too