ASCWG
Last updated
Last updated
βCyber WarGames 2020OverviewTogether with my friendMohamed Midowe have been able to solve this challengeChallange Desciption:Difficulty: EasyPoints: 300 pointCategory: WebChallange Link: 10.0.0.5 on LAN Network it is not Available Onlinevulnerability :SSIβStepsunderstanding the web appGo to 10.0.0.5you will get this login FormAfter making some routing search on this page like: show source Code, Request, resopsne and Cookies i didnβt find any thing can catche my attention.so,first thing I tried deafault credentials like admin:adminββ
you will get welcome message with the value of $_POST[βnameβ]
β
i didnβt gey Anything useful
Notice red rectangle
around file Name and extension .shtml
return to Login Form
try Login using anything you will login i will try login with yasser:yasser or xss payload will work but not return with flag or any thing
β
you will notice that file name was change again
and still with shtml extension
β
β
β
you can using any scanner like burp scanner To be sure
Fire Burp Suite and injecti payload , What Happend?
β
Click Follow Redirection
β
Bing0o0o0o0o we got flag file
letβs try to display this file to get the flag
https://i.ibb.co/Bw3TvB8/redirect-2.png
Click Follow Redirection Again
Bingo0o0o0o we Got The Flag
β
Kourama
Penetesting, Bug Bounty, CTF player.
open first and read it
so it may be Server Side Injection
So i will seearch about β