This is an old revision of the document!
Table of Contents
Blog
HTB - Web Requests
To get the flag, start the above exercise, then use cURL to download the file returned by '/download.php' in the server shown above.
HTB{64$!c_cURL_u$3r}
What is the HTTP method used while intercepting the request? (case-sensitive)
GET
Send a GET request to the above server, and read the response headers to find the version of Apache running on the server, then submit it as the answer. (answer format: X.Y.ZZ)
2.4.41
The server above loads the flag after the page is loaded. Use the Network tab in the browser devtools to see what requests are made by the page, and find the request to the flag.
HTB{p493_r3qu3$t$_m0n!t0r}
The exercise above seems to be broken, as it returns incorrect results. Use the browser devtools to see what is the request it is sending when we search, and use cURL to search for 'flag' and obtain the flag.
HTB{curl_g3773r}
Obtain a session cookie through a valid login, and then use the cookie with cURL to search for the flag through a JSON POST request to '/search.php'
HTB{p0$t_r3p34t3r}
First, try to update any city's name to be 'flag'. Then, delete any city. Once done, search for a city named 'flag' to get the flag.
HTB{crud_4p!_m4n!pul4t0r}
Masters of Disaster: Honoring a Legacy of Hacking Excellence
The world of hacking has evolved dramatically over the decades, but few groups have left as lasting an impact as the Masters of Disaster. Known for their groundbreaking exploits, technical prowess, and unwavering commitment to knowledge, they are a fundamental part of hacking history. This blog post serves as a tribute to their contributions, their philosophy, and their enduring influence in the digital age.
The Legacy of the Legion of Doom: Pioneers of the Hacker Underground
The history of hacking is filled with legendary names, but few evoke as much reverence and controversy as the Legion of Doom (LoD). Active primarily during the 1980s and early 1990s, LoD was one of the most influential hacking collectives in the early days of the digital underground. Their contributions to hacking culture, their role in shaping cybersecurity, and their legacy in today’s hacker communities remain significant.
Unmasking the Digital Revolution: The Legacy of 2600 Magazine and Emmanuel Goldstein
In the vast expanse of cyberspace, where anonymity reigns supreme and information flows freely, one publication has stood the test of time, becoming a beacon for hackers, technophiles, and digital enthusiasts worldwide: 2600 Magazine. At its helm, the enigmatic figure known as Emmanuel Goldstein, the magazine's editor, has become a symbol of the hacker ethos, inspiring generations with his unwavering dedication to digital freedom and unrestricted knowledge exchange.
The Enigma Unveiled: Edward Snowden - Hero or Villain?
In the interconnected web of the digital age, where information is power and privacy is a luxury, few individuals have captured the world's attention quite like Edward Snowden. To some, he is a heroic whistleblower, unveiling the clandestine operations of government surveillance agencies. To others, he is a traitor, jeopardizing national security in the name of transparency. From a pro hacker's perspective, Snowden's life leaks and controversy serve as a testament to the complexities of our modern, digitized society.
In Memory of Kevin Mitnick: A Maverick of Cyberspace
Born: August 6, 1963
Died: July 16, 2023
With heavy hearts, we bid farewell to a true pioneer of the digital realm, Kevin Mitnick, who embarked on his final journey on July 16, 2023. Renowned as a relentless explorer of the virtual landscapes, Kevin's spirit was as unbound as the data streams he traversed.
The Crypto Anarchist Manifesto
By: Timothy C. May
A specter is haunting the modern world, the specter of crypto anarchy.
Hacker Poetry
In a recent episode of Off the Wall they discussed using ChatGPT to write hacker poetry. I decided to generate some of my own and share it here.
Telephone Time
Back in the day if you needed to know the time to set your clocks you called the telephone operator and asked her for the time. Over time this became a dedicated service where an operator would site in front of a microphone reading out the time, and anyone could call in and listen to her reading the time. In time it became an automated service, with a computer reading off the time.
The Conscience of a Hacker
The Conscience of a Hacker