Web Problem solving with r0ot-mi. Part 2

image

This article contains the solution of tasks aimed at the operation of web-connectivity. This article is mainly aimed at beginners who want to understand HTTP headers and participate in CTF. References to the previous parts of this section:

Web Problem solving with r0ot-mi. Part 1

Organizational Information
Especially for those who want to learn something new and develop in any of the areas of information and computer security, I will write and talk about the following categories:

  • PWN;
  • cryptography (Crypto);
  • network technologies (Network);
  • reverse (Reverse Engineering);
  • steganography (Stegano);
  • search and exploitation of WEB vulnerabilities.

In addition to this, I will share my experience in computer forensics, analysis of malware and firmware, attacks on wireless networks and local area networks, conducting pentests and writing exploits.

So that you can find out about new articles, software and other information, I created a channel in Telegram and a group to discuss any issues in the field of ICD. Also, I will personally consider your personal requests, questions, suggestions and recommendations personally and will answer everyone .

All information is provided for educational purposes only. The author of this document does not bear any responsibility for any damage caused to anyone as a result of using knowledge and methods obtained as a result of studying this document.

HTTP Headers


image

We follow the link, and we are greeted with the following message.

image

Let's look at the HTTP header.

image

The header has a Header-RootMe-Admin field equal to none. Let's change it to true.

image

Now we look at the server response.

image

HTTP POST


image

We follow the link, and we are offered to play the game.

image

The task is to dial more than 999999, but how many do not press, you can’t.

image

We look at the code. JavaScript generates a random number and sends it to the server.

image

Open the HTTP header and change the generated number.

image

And we won.

image

HTTP improper redirect


image

We are met by an authorization form.

image

When loading the page, you can see the redirect. To confirm this, go to Burp and intercept the request.

image

Now send this header to repeater. And do not perform an automatic transition.

image

HTTP verb tampering


image

We are met by HTTP authentication.

image

Let's go through all the HTTP methods.

image

image

image

And the PUT method gives us a page without authorization.

Install files


image

A blank page meets us. We look at the source code.

image

So, phpbb is used, therefore we will pass to the address / phpbb / install.

image

We open the only page, we take away the flag.

image

Further more and more complicated ... You can join us on Telegram . Let's put together a community in which there will be people who are versed in many areas of IT, then we can always help each other on any IT and information security issues.

Source: https://habr.com/ru/post/476216/


All Articles