|
12 | 12 | "Overwrite the <a href=\"/ftp/legal.md\">Legal Information</a> file.": "Skriv över filen <a href=\"/ftp/legal.md\">Legal Information</a>.", |
13 | 13 | "Look out for a tweet praising new functionality of the web shop. Then find a third party vulnerability associated with it.": "Håll utkik efter en tweet som lovordar ny funktionalitet i webbshoppen. Hitta därefter en tredjeparts-sårbarhet i samband med den.", |
14 | 14 | "Reset the password of Bjoern's OWASP account via the <a href=\"/#/forgot-password\">Forgot Password</a> mechanism with <i>the original answer</i> to his security question.": "Återställ lösenordet för Bjoerns OWASP-konto via <a href=\"/#/forgot-password\">Glömt lösenord</a>-mekanismen genom att använda <i>det ursprungliga svaret</i> på hans säkerhetsfråga.", |
15 | | - "Learn about the Token Sale before its official announcement.": "Learn about the Token Sale before its official announcement.", |
16 | | - "The developers truly believe in \"Security through Obscurity\" over actual access restrictions.": "The developers truly believe in \"Security through Obscurity\" over actual access restrictions.", |
17 | | - "Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.": "Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.", |
18 | | - "The feature you need to exploit for this challenge is not directly advertised anywhere.": "The feature you need to exploit for this challenge is not directly advertised anywhere.", |
| 15 | + "Learn about the Token Sale before its official announcement.": "Läs mer om Token Sale innan dess officiella tillkännagivande.", |
| 16 | + "The developers truly believe in \"Security through Obscurity\" over actual access restrictions.": "Utvecklarna tror verkligen på \"Säkerhet genom Oklarhet\" istället för faktiska tillträdesbegränsningar.", |
| 17 | + "Perform a Remote Code Execution that would keep a less hardened application busy <em>forever</em>.": "Utför en Fjärrstyrd Kodexekvering som skulle hålla en mindre härdad applikation upptagen <em>för alltid</em>.", |
| 18 | + "The feature you need to exploit for this challenge is not directly advertised anywhere.": "Den funktion du behöver för att utnyttja för denna utmaning visas inte tydligt någonstans.", |
19 | 19 | "Submit 10 or more customer feedbacks within 20 seconds.": "Skicka in 10 eller fler kundåterkopplingar på mindre än 20 sekunder.", |
20 | | - "After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.", |
21 | | - "Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.", |
22 | | - "In previous releases this challenge was wrongly accused of being based on CSRF.": "In previous releases this challenge was wrongly accused of being based on CSRF.", |
| 20 | + "After finding a CAPTCHA bypass, write a script that automates feedback submission. Or open many browser tabs and be really quick.": "Efter att ha hittat ett sätt att gå runt CAPTCHA, skriv ett skript som automatiserar återkopplingen. Eller öppna många webbläsarflikar och var riktigt snabb.", |
| 21 | + "Change Bender's password into <i>slurmCl4ssic</i> without using SQL Injection or Forgot Password.": "Ändra Benders lösenord till <i>slurmCl4ssic</i> utan att använda SQL-injektion eller Glömt lösenord.", |
| 22 | + "In previous releases this challenge was wrongly accused of being based on CSRF.": "I tidigare utgåvor anklagades denna utmaning felaktigt för att vara baserad på CSRF.", |
23 | 23 | "Order the Christmas special offer of 2014.": "Beställ specialerbjudandet från julen 2014.", |
24 | | - "Find out how the application handles unavailable products and try to find a loophole.": "Find out how the application handles unavailable products and try to find a loophole.", |
25 | | - "Bypass the Content Security Policy and perform an XSS attack with <code><script>alert(`xss`)</script></code> on a legacy page within the application.": "Bypass the Content Security Policy and perform an XSS attack with <code><script>alert(`xss`)</script></code> on a legacy page within the application.", |
26 | | - "What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!", |
27 | | - "Perform a <i>persisted</i> XSS attack with <code><iframe src=\"javascript:alert(`xss`)\"></code> bypassing a <i>client-side</i> security mechanism.": "Perform a <i>persisted</i> XSS attack with <code><iframe src=\"javascript:alert(`xss`)\"></code> bypassing a <i>client-side</i> security mechanism.", |
| 24 | + "Find out how the application handles unavailable products and try to find a loophole.": "Ta reda på hur programmet hanterar otillgängliga produkter och försök att hitta ett kryphål.", |
| 25 | + "Bypass the Content Security Policy and perform an XSS attack with <code><script>alert(`xss`)</script></code> on a legacy page within the application.": "Gå förbi säkerhetspolicyn för innehåll och utför en XSS-attack med <code><script>alert(`xss`)</script></code> på en äldre sida inom programmet.", |
| 26 | + "What is even \"better\" than a legacy page with a homegrown RegEx sanitizer? Having CSP injection issues on the exact same page as well!": "Vad är ännu \"bättre\" än en äldre sida med en hemodlad RegEx sanitizer? Att ha CSP-injektionsfrågor på exakt samma sida också!", |
| 27 | + "Perform a <i>persisted</i> XSS attack with <code><iframe src=\"javascript:alert(`xss`)\"></code> bypassing a <i>client-side</i> security mechanism.": "Utför en <i>ihållig</i> XSS-attack med <code><iframe src=\"javascript:alert(`xss`)\"></code> för att undgå en säkerhetsmekanism på <i>klientsidan</i>.", |
28 | 28 | "Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.": "Only some input fields validate their input. Even less of these are persisted in a way where their content is shown on another screen.", |
29 | 29 | "Access a confidential document.": "Access a confidential document.", |
30 | 30 | "Analyze and tamper with links in the application that deliver a file directly.": "Analyze and tamper with links in the application that deliver a file directly.", |
|
0 commit comments