Hackernoon logo
Hackernoon
7,888 reads

How I exploited a loophole in a system

by
byxitty cat@xittycat

October 11th, 2016
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
featured image - How I exploited a loophole in a system
xitty cat
byxitty cat@xittycat
    byxitty cat@xittycat

xitty cat
    byxitty cat@xittycat

About Author

xitty cat HackerNoon profile picture
xitty cat@xittycat

Read my storiesAbout @xittycat

Comments

avatar

TOPICS

life-hacking#hacking#exploit#true-story#life-lessons#thriller

THIS ARTICLE WAS FEATURED IN

Arweave
viewblock
ViewBlock
TerminalTerminalLiteLite
Aryan
Co
Blogspot
Blogspot

Related Stories

Story image

Untitled Story

Author

HackerNoon Writer

Windows Sticky Keys Exploit: The War Veteran That Never Dies
#HACKERS-AND-HACKING

Windows Sticky Keys Exploit: The War Veteran That Never Dies

Mark Tey

Mark Tey

Nov 20, 2019

Binary Exploitation ELI5– Part 1
#BINARY-EXPLOIT

Binary Exploitation ELI5– Part 1

Daniel A. Bloom

Daniel A. Bloom

Apr 29, 2018

Critical Security Update: Coinbase Security Team Discovers Zero-Day Exploit in Firefox
#CYBERSECURITY

Critical Security Update: Coinbase Security Team Discovers Zero-Day Exploit in Firefox

LPX

LPX

Jun 19, 2019

Crypto Security: How To Protect Your Project From Hacking
#CYBERSECURITY

Crypto Security: How To Protect Your Project From Hacking

Sergei Khitrov

Sergei Khitrov

Oct 05, 2022

Explain Spectre and Meltdown Like I’m 5
#SPECTRE

Explain Spectre and Meltdown Like I’m 5

Daniel A. Bloom

Daniel A. Bloom

Jan 08, 2018

/undefined feature image

/undefined feature image
author
byHackerNoon Writer
/-windows-sticky-keys-exploit-the-war-veteran-that-never-dies-its-very-likely-that-youve-heard-8ei2duh feature image

Windows Sticky Keys Exploit: The War Veteran That Never Dies

/-windows-sticky-keys-exploit-the-war-veteran-that-never-dies-its-very-likely-that-youve-heard-8ei2duh feature image
author
byMark Tey@mark-tey
#HACKERS-AND-HACKING
/binary-exploitation-eli5-part-1-9bc23855a3d8 feature image

Binary Exploitation ELI5– Part 1

/binary-exploitation-eli5-part-1-9bc23855a3d8 feature image
author
byDaniel A. Bloom@danielabloom
#BINARY-EXPLOIT
/critical-security-update-coinbase-security-team-discovers-zero-day-exploit-on-firefox-ed888d32f18d feature image

Critical Security Update: Coinbase Security Team Discovers Zero-Day Exploit in Firefox

/critical-security-update-coinbase-security-team-discovers-zero-day-exploit-on-firefox-ed888d32f18d feature image
author
byLPX@LPX
#CYBERSECURITY
/crypto-security-how-to-protect-your-project-from-hacking feature image

Crypto Security: How To Protect Your Project From Hacking

/crypto-security-how-to-protect-your-project-from-hacking feature image
author
bySergei Khitrov@serkhitrov
#CYBERSECURITY
/explain-spectre-and-meltdown-like-im-5-494a6ba61061 feature image

Explain Spectre and Meltdown Like I’m 5

/explain-spectre-and-meltdown-like-im-5-494a6ba61061 feature image
author
byDaniel A. Bloom@danielabloom
#SPECTRE

Light-Mode

Classic

Newspaper

Dark-Mode

Neon Noir

Minty

HN StartUps