Information disclosure and why understanding the logic is crucial

Getting back to basics

Crack the hash!

  • div id which looks like a timestamp
  • data-id which is some additional id (some internal message id?)
  • width, height of the full image, and 600 as a number in the end of the link to it
  • message timestamp
  • account’s id
  • some hashes from the cookies
  • data-id
  • all the parts of my id from the link
  • height and width
  • some divider characters like “_” and “|” that can be used during the hashing

What's next?

  • user id
  • timestamp




Infosec newbie

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Manual Testing

Common problems & solutions for running Agile Retrospectives

Why we need to talk about contingency plans in software development

Turning failure demand into value demand

How a Mechanical Engineer, who had an aversion towards writing a very simple code, steps into the…

How to Export Data from BigQuery to Excel?

Modbus-Based-Alert System Desktop Application Using .Net-C#-WPF and Material Design

Eager Electron 5.1.9763 — Testnet — Release Notes

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Infosec newbie

More from Medium

Let me tell you about SSH..

Yogosha Christmas Challenge 2021

Previse Writeup — HackTheBox

HTB-Lame Writeup