Advent of Cyber 3 (2021) [Day 7 - NoSQL]
[Day 7] Web Exploitation Migration Without Security
Credits: RealTryHackMe
Please Read Day 07 About NoSQL
First Flag - Q: Interact with the MongoDB server to find the flag. What is the flag?
- As you read turn on your Machine
- Open Terminal
- Type ssh thm@MACHINE_IP -p 2222
- As you read in This room of day 07
- Do the same steps like the image Below
- login ssh
- Interact with mongo db
- show your databases
- Use flagdb DataBase
- So Now** you’r in flagdb** Database
- List All Collections == Tables
- Will Find flag Column == Fields in this Records == Documents
Second Flag - Q: Interact with the MongoDB server to find the flag. What is the flag?
- Open http://MACHINE_IP
- Try to inject dummy data in username and password Fields
- Fire up Your Burp
- Intercept the Request after sending username and password Inputs Fields
- As you read in This room of day 07
- As You learned send username parameter with admin
- Change password paramter to anything
- Paramter password[$ne]=anything
- $ne == Not Equal
- To make all statement Like True as SQLI
- Username is admin & Password not equal anything == [TRUE]
- Respose will be 302 Found
- Press Follow Redirection
- You will find flag Directory
- Click Right and Choose Copy Response Link from burp response in repeater
- Paste Link in Browser and clcik on flag link
Third Flag - Q: Once you are logged in, use the gift search page to list all usernames that have guest roles. What is the flag?
- After login you will see search link
- Search with any dummy data
- As you read in This room of day 07
- Change GET Paramters username & role to be TRUE
- How to make it True First and Second Paramter each paramter should be TRUT to make all Request True
- Username Paramter Not Equal admin == anyusername
- Role Paramter Not Equal admin also == Role=guest
- From 7,8 The Request will be True To get All guests Usernames Not Admin
- The Response Will Retraive The THM flag
Fourth Flag - Q: Use the gift search page to perform NoSQL injection and retrieve the mcskidy record. What is the details record?
- After login you will see search link
- Search with any dummy data
- As you read in This room of day 07
- Change GET Paramters username & role to be TRUE
- How to make it True First and Second Paramter each paramter should be TRUT to make all Request True
- Username Paramter Value mcskidy
- Role Paramter Value Not Equal admin also
- But i didn’t ant flag in respose
- Change Role Paramter Value Not Equal admin guest == Role=admin
- From 7,10 The Request will be True To get mcskidy Username with Admin Role
- The Response Will Retraive The THM flag