web broken-access-control command-injection path-traversal sql-injection-basics crypto caesar-cipher ecb-mode-detection hash-length-extension weak-random pwn buffer-overflow-intro format-string-basics integer-overflow use-after-free-intro rev disassembly-intro password-checker string-analysis xor-cipher forensics file-signature-analysis metadata-extraction pcap-analysis steganography-basics