-
6 votes
-
Illegal streams, decrypting m3u8's, and building a better stream experience
14 votes -
For hackers, anonymity was once critical. That’s changing.
10 votes -
Watch Your Hack
6 votes -
How an international hacker network turned stolen press releases into $100 million
12 votes -
Reality Winner, former NSA translator, gets more than five years in leak of Russian hacking report
12 votes -
Ajit Pai knew DDoS claim was false in January, says he couldn’t tell US Congress
32 votes -
An 11-year-old hacked into a US voting system replica in ten minutes this weekend
9 votes -
Learning to pentest
Hi, I need your help to learn pentesting. I'm programming for several years. I'm really good in C# and can write moderately complex apps in Dart, Python and JavaScript. I'm in highschool and work...
Hi, I need your help to learn pentesting.
I'm programming for several years. I'm really good in C# and can write moderately complex apps in Dart, Python and JavaScript. I'm in highschool and work for software development company as backend developer. But general programming starts to feel so boring...
I've started to watch LiveOverflow on youtube (no link, there is no wifi here and I don't want youtube to drain my data) and it was so interesting - so I tried it. I've tried few CTFs, read many writeups, and now I've discovered CTF hack the box.
When I know what to do, I have no problem googling and researching and later applying my knowledge. But I often discover, that I just don't know what I don't know.
There is one CTF challenge that I haven't completed yet. It's 20 line html page, no javascript, nothing suspicous. No cookies. It has just form with password input, which sends post request to server. Here's the problem - how do I get the flag (the password)? I can bruteforce it, but it clearly isn't the correct way. I know that the php runs on apache, debian. I've tried getting some files, I've tried going up (
../
), sql injection, nothing works.And here's the general problem - what am I missing? What to learn? What should I google? I don't want ideas what I'm missing on this one example - Instead I need some sources where I learn generally about vulnerabilities I can exploit. Some blog, some website, something like this.
Could someone here recommend me some sources where I learn about this? How did you start and what things do you generally check when you face something you have to break into?
Thank you
16 votes -
DIYers hack insulin pump - create artificial pancreas
13 votes -
‘It’s our time to serve the Motherland’ How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers
6 votes -
US Federal Communications Commission admits it was never actually hacked
21 votes -
New wi-fi crack attack allows outsiders to snag user creds
11 votes -
Reddit servers breached; full backup from 2007 (including hashed+salted passwords) obtained by attackers
77 votes -
The SIM Hijackers
8 votes -
George Hotz is on a hacker crusade against the "scam" of self-driving cars
6 votes -
Chinese hackers breach Australian National University, putting national security at risk
5 votes -
The fight between Switch hackers and Nintendo is ramping up
11 votes -
Inside the bunkers and war rooms where major banks wage nightly battle on the frontline of cyber war
5 votes -
FireEye Blog: Bring Your Own Land
2 votes -
Airgeddon - Wireless auditing made easy
3 votes -
China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare
7 votes -
How a hacker proved cops used a secret government phone tracker to find him
14 votes -
A day later, Ticketfly is still offline after failing to pay bitcoin ransom to hacker
6 votes -
Decade-old Steam bug could've been used to hijack PCs
7 votes -
Security vulnerabilities on some BMWs could allow remote access
6 votes -
Man is charged with hacking West Point and government websites
6 votes