# Event Loop Blocking + Lazy images {{#include ../../banners/hacktricks-training.md}} In [**this exploit**](https://gist.github.com/aszx87410/155f8110e667bae3d10a36862870ba45), [**@aszx87410**](https://twitter.com/aszx87410) mixes the **lazy image side channel** technique through a HTML injection with kind of **event loop blocking technique** to leak chars. This is a **different exploit for the CTF chall** that was already commented in the following page. take a look for more info about the challenge: {{#ref}} connection-pool-example.md {{#endref}} The idea behind this exploit is: - Пости завантажуються в алфавітному порядку - **Атакуючий** може **впровадити** **пост**, що починається з **"A"**, тоді якийсь **HTML тег** (наприклад, великий **`
``` {{#include ../../banners/hacktricks-training.md}}