Have you tried the Jukebox? I put this online, with no sanitation of input, to test what happens when you hack a container in a real world situation that uses the architecture it is built on to protect itself, but nothing more.
This is naked on the internet, please feel free to use it to break through. Smash away, get creative. Let’s see what the pieces look like after and figure out how to make it better.Please note, when you use any characters outside of the letters and numbers, it may be interperted as shell code and executed as is. I know, crazy, but it makes testing exploits against it really easy. However, this could be a problem if you just want to listen to music, so I suggest you do not bother with any punctuation. Just write out a few keywords of what you are looking for is about all it needs.
http://jukebox.c51.wtf - It was never about the music. It was about testing a new kind of security policy.
Someone might be hacking in right now, I’m just not sure I give a shit.
Jukebox From Hell
Title:Jukebox From Hell
Created by:Gateway To The Sky Project
Created:2017-01-13 - 21:14
Last Update:2017-03-05 - 21:36
Link:http://blog.gatewayinthesky.net/2017/01/13/Jukebox-From-Hell/
License: "CC 3.0" For Intended Audiences Only
First World Technical Challenges
Universal Language
>