<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Base64 Password Decoding on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/base64-password-decoding/</link><description>Recent content in Base64 Password Decoding on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 16 Mar 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/base64-password-decoding/index.xml" rel="self" type="application/rss+xml"/><item><title>Snookum Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_snookum/</link><pubDate>Sun, 16 Mar 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_snookum/</guid><description>&lt;h2 id="snookum-offsec-walkthrough">
 Snookum OffSec Walkthrough
 &lt;a class="heading-link" href="#snookum-offsec-walkthrough">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="rfi-vulnerability">
 RFI Vulnerability
 &lt;a class="heading-link" href="#rfi-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>Remote File Inclusion (RFI) is a vulnerability in web applications that allows an attacker to upload and execute files hosted on external servers. This flaw occurs when an applicationdynamically includes files without properly validating user input, which can lead to the execution of malicious code. If proper security measures are not taken, RFI can completely compromise a system, facilitating data theft, malware execution, or even full control of the server.&lt;/p></description></item></channel></rss>