- MonkeHacks
- Posts
- MonkeHacks #66
MonkeHacks #66
H1-6102 Travel, Disclosed, Comfort
MonkeHacks #66
This week I was back in Cork for about two or three days - and yesterday I began my long journey towards H1-6102 in Sydney. I took the train to Dublin (2.5hrs), then flew to London Heathrow (1hr), and then to the UAE (about 6 hours). I write this from the Etihad lounge in Abu Dhabi airport, having flown here an hour ago. In about two hours, I fly to Sydney (14hrs), all totalling about 38hrs of continuous travel.
The dupe period just concluded so it was a very busy week of hacking. I struggled in this event, big time - I have a few very interesting things but very little materialised into something I could label a vulnerability. I went outside my comfort zone a bit this time, so I’ve still learned a ton, but I’m determined to expand my skillset significantly after this event. Always grateful to be there at these events, but a bit disappointed in myself this time.
Also, after Ken Gannon (of the Chainspotting 2 talk last week) disparaged the difficulty of web hacking a bit in his talk, it motivated me to learn more fields of hacking so I can create more inter-disciplinary chains.

A nice meadow around where I grew up in Cork.
Weekly Ideas / Notes
I’m en-route to Sydney - if you’re reading this and you’re in the LHE, see you there! I took a shower in the lounge in Abu Dhabi on the way and wow. Such a game-changer when you can refresh yourself a bit.
It’s nice to have it both ways - push outside your comfort zone, but reward yourself well. That’s how we grow.
I’ve been applying my own learning methodology during this event to learn as much as I can. I think the recordings are up here for free.
Masato Kinugawa found a weird bypass for HTML denylists. It really is weird. But cool.
Harley built disclosedonline.com! It’s a pretty neat directory of bug bounty folks across platforms. My profile is here. Thanks, Harley!
Resources
What I Learned From My First 100 HackerOne Reports by Evan Connelly: Evan is an excellent researcher and this article is very well phrased. Highly recommend reading this.
The Single-Packet Shovel: Digging for Desync-Powered Request Tunnelling: Thank you Hive Five for sharing this - this is an excellent article on some more HTTP attacks, namely combining the Single-Packet Attack with HTTP Desync. A very, very interesting read.
Beating the kCTF PoW with AVX512IFMA for $51k: An amazing writeup on optimising a Proof-of-Work problem that was designed to slow down researchers in submitting a flag.