Ir al contenido
cyberhub.es
  • Home
  • CTFs resueltos
    • PicoCTF
      • PicoCTF 2024 writeup
  • Portswigger Lab writeup
    • Access control
    • API Testing
    • CORS
    • Cross-site scripting
    • CSRF
    • File upload
    • GraphQL API vulnerabilities
    • NoSQL injection
    • OS command injection
    • Path traversal
    • SQL injection
    • SSRF
    • Web LLM attacks
    • WebSockets
  • Home
  • CTFs resueltos
    • PicoCTF
      • PicoCTF 2024 writeup
  • Portswigger Lab writeup
    • Access control
    • API Testing
    • CORS
    • Cross-site scripting
    • CSRF
    • File upload
    • GraphQL API vulnerabilities
    • NoSQL injection
    • OS command injection
    • Path traversal
    • SQL injection
    • SSRF
    • Web LLM attacks
    • WebSockets

Etiqueta: Apprentice

CORS vulnerability with basic origin reflection

Descripción This website has an insecure CORS configuration in that it trusts all origins. To solve the lab, craft some JavaScript that uses CORS to retrieve the administrator’s API key and upload the code to your exploit server. The lab is solved when you successfully submit the administrator’s API key. You can log in to […]

Password reset broken logic

Descripción This lab’s password reset functionality is vulnerable. To solve the lab, reset Carlos’s password then log in and access his «My account» page. Victim’s username: carlos Your credentials: wiener:peter Password reset broken logic writeup Al entrar veremos un blog. Iremos primero a ‘Email client’ y anotaremos el correo electrónico que nos proporciona la página web: Ahora, […]

2FA simple bypass

Descripción This lab’s two-factor authentication can be bypassed. You have already obtained a valid username and password, but do not have access to the user’s 2FA verification code. To solve the lab, access Carlos’s account page. 2FA simple bypass writeup Al entrar veremos un blog. Iremos a ‘My account’ e iniciaremos sesión con el usuario […]

Username enumeration via different responses

Descripción This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists: To solve the lab, enumerate a valid username, brute-force this user’s password, then access their account page Username enumeration via different responses writeup Al entrar […]

Authentication bypass via OAuth implicit flow

Descripción This lab uses an OAuth service to allow users to log in with their social media account. Flawed validation by the client application makes it possible for an attacker to log in to other users’ accounts without knowing their password. To solve the lab, log in to Carlos’s account. His email address is carlos@carlos-montoya.net. You […]

Flawed enforcement of business rules

Descripción This lab has a logic flaw in its purchasing workflow. To solve the lab, exploit this flaw to buy a «Lightweight l33t leather jacket». You can log in to your own account using the following credentials: wiener:peter Flawed enforcement of business rules writeup Al entrar veremos una tienda online que nos ofrece el cupón de […]

Inconsistent security controls

Descripción This lab’s flawed logic allows arbitrary users to access administrative functionality that should only be available to company employees. To solve the lab, access the admin panel and delete the user carlos. Inconsistent security controls writeup Al entrar en el laboratorio veremos una tienda online. Añadiremos a la URL (/admin) para acceder al panel de […]

High-level logic vulnerability

Descripción This lab doesn’t adequately validate user input. You can exploit a logic flaw in its purchasing workflow to buy items for an unintended price. To solve the lab, buy a «Lightweight l33t leather jacket». You can log in to your own account using the following credentials: wiener:peter High-level logic vulnerability writeup Entramos en ‘My account’ […]

Excessive trust in client-side controls

Descripción This lab doesn’t adequately validate user input. You can exploit a logic flaw in its purchasing workflow to buy items for an unintended price. To solve the lab, buy a «Lightweight l33t leather jacket». You can log in to your own account using the following credentials: wiener:peter Excessive trust in client-side controls writeup Entramos en […]

Information disclosure in version control history

Descripción This lab discloses sensitive information via its version control history. To solve the lab, obtain the password for the administrator user then log in and delete the user carlos. Information disclosure in version control history writeup Como nos habla de un control de versiones, lo primero que haremos es entrar en ‘./git’ en la aplicación. Allí encontraremos […]

← Anterior
Siguiente →
cyberhub.es
  • Política de Cookies

Todos los derechos reservados