Lab 5 - Carnival Chaos¶
Table of Contents¶
Overview¶
This lab provides a web application that needs to be exploited with a NoSQL attack to extract hidden information.
Analysis¶
Using Burp Suite:
- Go to Proxy.
- Turn ON Intercept.
- Start web site with the given IP address.
- Enter anything in the username and password fields to capture the request.
- Under Actions select Send to Repeater.
- Set payload to this JSON:
- Click "Send".
- On the Response, confirm the successful request and grab the value for the
sessioncookie.
In the web browser:
- Start the Developer Tools on the browser with the website.
- On the Debug side, check the code to confirm the page name with the desired information. It is
/prizes. - Go to Application > Cookies and Add Item with name
sessionand value set to the one captured above. - Change the URL to be
<IP address>/prizesto load the page with the information. - Scroll down to the entry with the skeleton key and extract the name.
Solution¶
- What is the six character token at the end of the skeleton key prize name?
e28106 - What is the name of the skeleton key?
sp00ky-Sk3L3T0N-k3y
Navigation¶
| ← Escape from jAWS! | Rusty Rollercoaster → |