-
10 votes
-
Significant cyber incidents | Strategic technologies program
1 vote -
4-year campaign backdoored iPhones using possibly the most advanced exploit ever
43 votes -
Now Open: 2023 SANS Holiday Hack Challenge & KringleCon
1 vote -
Systems Alchemy: The Transmutation of Hacking (2023)
5 votes -
The true cost of a hack: The Rackspace Special
8 votes -
New acoustic attack steals data from keystrokes with 95% accuracy
48 votes -
Hacking a weird TV censoring device
3 votes -
Notkia: Building an open and linux-powered numpad phone
2 votes -
Adventures of putting 16 GB of RAM in a motherboard that doesn’t support it
7 votes -
How the world's first USB-C iPhone was born
10 votes -
Introduction to Cross-Site Scripting (XSS)
4 votes -
Using John the Ripper To Crack Password Hashes
3 votes -
DDOS question/curiosity
Non-comp person here; is there a record for longest period of time a DDOS attack occurred on a website? Would it be possible to forcibly keep a site offline for an extended length of time with a...
Non-comp person here; is there a record for longest period of time a DDOS attack occurred on a website? Would it be possible to forcibly keep a site offline for an extended length of time with a continuous DDOS attack?
7 votes -
DSP on the ESP32 With Faust
3 votes -
Google Dorks Explained : How hackers get access to sensitive data using only Google search queries
7 votes -
How To Use Nmap: A Beginner’s Guide
4 votes -
Overthewire: Learn Hacking By Playing Games
9 votes -
How police are “breaking phone encryption”
21 votes -
The 2020 SANS holiday hack challenge is live!
4 votes -
Hacking a gopher client into the Alpha Micro
6 votes -
Security researcher hacks SlickWraps, publishes a disclosure
8 votes -
Pair Locking your iPhone to prevent law enforcement forensic imaging with Configurator 2
10 votes -
Sonic Battle (GBA) Renderer Series
6 votes -
An Introduction to Mobile Networks, SIM Cards, and GSM.
9 votes -
Cracking a windshield and earning $10,000 on the Tesla Bug Bounty Program
12 votes -
Hacking thousands of websites via third-party JavaScript libraries
5 votes -
Hot-patching a buggy TV's EDID under Linux
7 votes -
How the Dreamcast's copy protection was defeated
14 votes -
Illegal streams, decrypting m3u8's, and building a better stream experience
14 votes -
Learning to pentest
Hi, I need your help to learn pentesting. I'm programming for several years. I'm really good in C# and can write moderately complex apps in Dart, Python and JavaScript. I'm in highschool and work...
Hi, I need your help to learn pentesting.
I'm programming for several years. I'm really good in C# and can write moderately complex apps in Dart, Python and JavaScript. I'm in highschool and work for software development company as backend developer. But general programming starts to feel so boring...
I've started to watch LiveOverflow on youtube (no link, there is no wifi here and I don't want youtube to drain my data) and it was so interesting - so I tried it. I've tried few CTFs, read many writeups, and now I've discovered CTF hack the box.
When I know what to do, I have no problem googling and researching and later applying my knowledge. But I often discover, that I just don't know what I don't know.
There is one CTF challenge that I haven't completed yet. It's 20 line html page, no javascript, nothing suspicous. No cookies. It has just form with password input, which sends post request to server. Here's the problem - how do I get the flag (the password)? I can bruteforce it, but it clearly isn't the correct way. I know that the php runs on apache, debian. I've tried getting some files, I've tried going up (
../
), sql injection, nothing works.And here's the general problem - what am I missing? What to learn? What should I google? I don't want ideas what I'm missing on this one example - Instead I need some sources where I learn generally about vulnerabilities I can exploit. Some blog, some website, something like this.
Could someone here recommend me some sources where I learn about this? How did you start and what things do you generally check when you face something you have to break into?
Thank you
16 votes -
FireEye Blog: Bring Your Own Land
2 votes -
Airgeddon - Wireless auditing made easy
3 votes