Posts ASCWG-Web-G(old)
Post
Cancel

ASCWG-Web-G(old)

Together with my friend Mohamed Mido we have been able to solve this challenge

Challange Desciption:

  • Difficulty: Easy
  • Points: 300 point
  • Category: Web
  • Challange Link: 10.0.0.5 on LAN Network it is not Available Online
  • vulnerability : SSI

Steps

understanding the web app

  • Go to 10.0.0.5
  • you will get this login Form
  • After making some routing search on this page like: show source Code, Request, resopsne and Cookies i didn’t find any thing can catche my attention.
  • so,first thing I tried deafault credentials like admin:admin
  • you will get welcome message with the value of $_POST[‘name’]
  • i didn’t gey Anything useful
  • Notice red rectangle around file Name and extension .shtml
  • return to Login Form
  • try Login using anything you will login i will try login with yasser:yasser or xss payload will work but not return with flag or any thing
  • you will notice that file name was change again
  • and still with shtml extension

What is shtml ?

  • open first link and read it
  • so it may be SSI Server Side Injection
  • you can using any scanner like burp scanner To be sure
  • So i will seearch about SSI payloads

Exploit SSI to get the Flag

  • Fire Burp Suite and injecti payload , What Happend?
  • Click Follow Redirection
  • Bing0o0o0o0o we got flag file
  • let’s try to display this file to get the flag
  • https://i.ibb.co/Bw3TvB8/redirect-2.png
  • Click Follow Redirection Again
  • Bingo0o0o0o we Got The Flag
This post is licensed under CC BY 4.0 by the author.