Web Problem solving with r0ot-mi. Part 1

image

This article contains the solution of tasks aimed at the operation of web-connectivity. Here we consider tasks affecting backup files, non-indexed directories, http headers, redirects and command injection.

Organizational Information
Especially for those who want to learn something new and develop in any of the areas of information and computer security, I will write and talk about the following categories:

  • PWN;
  • cryptography (Crypto);
  • network technologies (Network);
  • reverse (Reverse Engineering);
  • steganography (Stegano);
  • search and exploitation of WEB vulnerabilities.

In addition to this, I will share my experience in computer forensics, analysis of malware and firmware, attacks on wireless networks and local area networks, conducting pentests and writing exploits.

So that you can find out about new articles, software and other information, I created a channel in Telegram and a group to discuss any issues in the field of ICD. Also, I will personally consider your personal requests, questions, suggestions and recommendations personally and will answer everyone .

All information is provided for educational purposes only. The author of this document does not bear any responsibility for any damage caused to anyone as a result of using knowledge and methods obtained as a result of studying this document.

HTML - Source code


image

We open the page where we are asked to enter a password.

image

Let's see the source code of the page. Description and password.

image

HTTP redirect


image

We are asked to go to any page, except those presented on the site, we open the task.

image

Sort the source code.

image

We see that in the parameter, along with the URL, the parameter h is sent, similar to the md5 hash. Let's find the prototypes.

image

Together with the address, its hash is transmitted, let's go, for example, to Yandex.

image

image

HTTP - User-agent


image

We are told that we do not have an “admin” browser.

image

Let's set admin to the HTTP User agent field.

image

We get the answer.

image

HTTP Authentication


image

We are offered to undergo http authentication. Let's try to enter standard admin / admin (just like on ip-cameras). We get a message where they tell us about the flag.

PHP - command injection


image

You need to find the password in the index.php file. We are offered a form where we must insert the ip address.

image

As a result, it is transferred to the command line and ping is performed. Let's pass a chain of commands.

image

In the source code we see the password.

image

Backup file


image

We see the page with the login and password.

image

The title of the job says about backup. Let's look at the possible backup file names in the address bar.
.php.bak
.php.tar.gz
.php.zip
.php.001
.php~

The last one fits.

image

Log in, get the password.

HTTP - Directory indexing


image

Let's browse the source code.

image

We see the inclusion file. Given the name of the job, open the admin directory.

image

This directory is not indexed. We look backup.

image

We see the password there.

Further more and more complicated ... You can join us on Telegram . There you can propose your own topics and vote on the choice of topics for the following articles.

Source: https://habr.com/ru/post/470191/


All Articles