ZTH: Web 2

Introduction

Section 1: IDOR

Introduction

Exploitation

Challenge

Lets check the webpage

Lets login with the given credentials

Lets change the note parameter value to 0

Section 2: Forced Browsing

Introduction

Manual Exploitation

Automatic Exploitation

Challenge

Lets go to the web page

Lets login with the given credentials

Lets fuzz the name place so that we can find the right username

After some time we get a hit which is password

Section 3: API Bypassing

Introduction

Exploitation

Challenge

Lets check the web page

Lets login

We have an admin.php page and we can run commands, lets test a command

Looks like we are taken to a api.php page. admin.php might be a file on the machine, so we are directly accessing the directories of the machine in the URL, lets look for the flag which might be in a while called flag.txt (Most capture of the flag machines)

Last updated

Was this helpful?