https://tantemalkah.at/2025/fits-hacking
whoami
?That gender you got at birth? That's just a tutorial gender. You're only supposed to use it to get the hang on this world's gender system and then ditch it for a stronger one, not use it your entire life, noob
"A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; [...] There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission."
"The purpose [...] is to provide individuals the information once held only by governments and a few black hat hackers. In this day and age, individuals stand in the breach of cyberwar, not only against black hat hackers, but sometimes against governments. If you find yourself in this position, either alone or as a defender of your organization, we want you to be equipped with as much knowledge of the attacker as possible.
To that end, we submit to you the mindset of the gray hat hacker, an ethical hacker that uses offensive techniques for defensive purposes. The ethical hacker always respects laws and the rights of others, but believes the adversary may be beat to the punch by testing oneself first."
define the scope!
important!
This was just an excerpt of the most essential things you need to know about ethical hacking or pentesting. There is so much more, especially the reporting phase is crucial. But exploitation is probably most fun, so let's go for it.
One more caveat: you need some security basics and know a little bit about web applications first.
...just some examples...
telnet
on the command line to speak to a server:
HTTP responses can contain cookies, e.g.
HTTP/1.1 200 OK
Content-type: text/html
Set-Cookie: sessionToken=abcdef01234567890; Expires=Tue, 31 Aug 2021 12:34:56 GMT
Set-Cookie: foo=bar
Set-Cookie: chocolate=good
Set-Cookie: raisins=evil
In the next request to the same site the browser includes those cookies
GET /admin.html HTTP/1.1
Host: www.example.org
Cookie: sessionToken=abcdef01234567890; foo=bar; chocolate=good; raisins=evil;
excerpt from Sending Passwords on Postcards, recording available on YouTube
<img src="chockie.png" alt="Picture of a chocolate cookie" />
on the web app sec course page there is a link to
hit Ctrl+Shift+I
(Firefox)
or Ctrl+Shift+J
(Chromium)
or right-click and "Inspect"
try it out!
... right there in the browser console
alert("hey there!")
// or even simpler:
alert(1)
document.body
document.getElementById("try-it-out")
window.location
// and then let's change it
window.location = 'https://tantemalkah.at'
// this can be quite useful, but not very versatile in the console
// because everything you set here is gone after a reload
window.onload
Using the onclick
property of HTML tags
<p onclick="alert('are you sure you should have clicked that?')">...some text here...</p>
Here is an example.
Wouldn't you just want to click on this nice paragraph here?
It seems so deliciously clickable. With a bit of extra CSS crust.
A bit of border around it, color and changing the mouse cursor.
All just to make it more clickable.
Come on, click this shiny big button.
on the web app sec course page there is a link to
an intro to XSS
a practical kick-starter
with a very brief theoretical intro
creating a virtual machine (with virtual hardware) in which an OS can be run as if it would be installed on its own computer
the virtualisation host contains some form of virtualisation software (ideally hardware-assisted) that allows us to create virtual machines on which guest operating systems can be run
creating multiple isolated process environments that can run on the same operating system
a specific approach to OS-level virtualisation
Source: kubernetes.io, CC-BY 4.0
A technical explainer of how your computer runs programs, from start to finish.
By @kognise[Lexi Mattick (she/her)].
Under MIT license. Picture above is on https://cpu.land/the-basics
# Add Docker's official GPG key:
sudo apt-get update
sudo apt-get install ca-certificates curl
sudo install -m 0755 -d /etc/apt/keyrings
sudo curl -fsSL https://download.docker.com/linux/debian/gpg -o /etc/apt/keyrings/docker.asc
sudo chmod a+r /etc/apt/keyrings/docker.asc
# Add the repository to Apt sources:
echo \
"deb [arch=amd64 signed-by=/etc/apt/keyrings/docker.asc] https://download.docker.com/linux/debian trixie stable" | \
sudo tee /etc/apt/sources.list.d/docker.list > /dev/null
sudo apt update
# Now install Docker
sudo apt install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin
# just testing if everything works
docker run --rm hello-world
# starting a shell inside a basic Alpine Linux container
docker run --rm -it alpine sh
Remmeber: this is a Damn Vulnerable Web Application
# get the compose file from the DVWA repo
mkdir dvwa && cd dvwa
wget https://raw.githubusercontent.com/digininja/DVWA/refs/heads/master/compose.yml
# spin up the containers
sudo docker compose up
# visit http://localhost:4280 (with a browser in the kali VM)
# hit CTRL-C when you want to stop them again
# alternatively spin up in background (daemon mode)
sudo docker compose up -d
# check out what is running
docker ps
# stop them again (and clean up)
sudo docker compose down
13:00 — 14:00
on the web app sec course page there is a link to
an intro to SQLi
on the web app sec course page there is a link to