all InfoSec news
Solving Web Proxies CTF Challenge
Aug. 26, 2023, 6:51 a.m. | Ahmet Talha Şen
System Weakness - Medium systemweakness.com
Several Capture The Flag (CTF) difficulties including web proxies, request manipulation, decoding, fuzzing, and other techniques will be solved step-by-step in this essay. We’ll break down each difficulty step by step, outlining the reasoning behind it and the approaches employed to solve it.
Challenge 1: Interception and Command Manipulation
In this challenge, we’re presented with a web server and a task to intercept a ping request and manipulate its post data to read ‘flag.txt’.
Interception and Manipulation …
ctf-walkthrough ctf-writeup cybersecurity hackthebox hackthebox-writeup
More from systemweakness.com / System Weakness - Medium
OSI Model & TCP/IP Comparison
1 day, 16 hours ago |
systemweakness.com
First AD home lab
2 days, 12 hours ago |
systemweakness.com
Clocky | TryHackMe Write-up
3 days, 11 hours ago |
systemweakness.com
Tuesday Morning Threat Report: Apr 30, 2024
3 days, 11 hours ago |
systemweakness.com
Jobs in InfoSec / Cybersecurity
DevSecOps Engineer
@ Material Bank | Remote
Instrumentation & Control Engineer - Cyber Security
@ ASSYSTEM | Bridgwater, United Kingdom
Security Consultant
@ Tenable | MD - Columbia - Headquarters
Management Consultant - Cybersecurity - Internship
@ Wavestone | Hong Kong, Hong Kong
TRANSCOM IGC - Cybersecurity Engineer
@ IT Partners, Inc | St. Louis, Missouri, United States
Manager, Security Operations Engineering (EMEA)
@ GitLab | Remote, EMEA