THM Advent of Cyber 3 (2021) NoSQL WriteUp
Last updated
Last updated
[Day 7] Web Exploitation Migration Without Security
Credits: RealTryHackMe
Please Read Day 07 About NoSQL
As you read turn on your Machine
Open Terminal
Type ssh thm@MACHINE_IP -p 2222
As you read in This room on day 07
Do the same steps as the image Below
login ssh
Interact with Mongo DB
show your databases
Use flagdb DataBase
So now you are in flagdb Database
List All Collections == Tables
Will Find flag Column == Fields in this Records == Documents
Open http://MACHINE_IP
Try to inject dummy data in username and password Fields
Fire up Your Burp
Intercept the Request after sending username and password Inputs Fields
As you read in This room on day 07
As You learned send username parameter with admin
Change the password parameter to anything
Parameter password[$ne]=anything
$ne == Not Equal
To make all statements Like True as SQLI
Username is admin & Password not equal anything == [TRUE]
The response will be 302 Found
Press Follow Redirection
You will find the flag Directory
Click Right and Choose Copy Response Link from burp response in the repeater
Paste the Link in the Browser and click on flag link
After login, you will see search link
Search with any dummy data
As you read in This room on day 07
Change GET Parameters username & role to be TRUE
How to make it True First and Second Parameter each parameter should be TRUT to make all Request True
Username Paramter Not Equal admin == anyusername
Role Parameter Not Equal admin also == Role=guest
From 7,8 The Request will be True To get All guest's Usernames Not Admin
The Response Will Retraive The THM flag
After login, you will see search link
Search with any dummy data
As you read in This room on day 07
Change GET Parameters username & role to be TRUE
How to make it True First and Second Parameter each parameter should be TRUT to make all Request True
Username Paramter Value mcskidy
Role Parameter Value Not Equal admin also
But I didn’t ant flag in response
Change Role Parameter Value Not Equal admin guest == Role=admin
From 7,10 The Request will be True To get mcskidy Username with Admin Role
The Response Will Retraive The THM flag