Jump to content
StoNe-

[Pretty Medium] XSS Challenge

Recommended Posts

Posted (edited)

Sunt la moda acum challenge-urile XSS, mai iesim din atmosfera SQLi.

Target: Challenge XSS #1

Hint:

Ll6SK5ANb6QfDHXbgmWqQfTGDtKlpiu=bfTP0GrxHG6e+GXQSh6YngT8

Vectorul folosit pe PM + screenshot.

Succes!

Solvers:

- yoyois

- Sweby

- StrXt

- danyweb09

- Toshib4

- akkiliON

Edited by StoNe-
Posted (edited)

Si rezolvarea, ca de obicei:

Hintul dat este criptat in ATOM-128, de 3 ori, si decriptandu-l, va contine textul "$_GET['h']". Deci, vom seta parametrul GET "h" pentru continuare:

Challenge XSS #1

In continuare, setat cu acest parametru, avem pe pagina:

$_GET["0344ef225724e63e08ab2896224c6b71"] ||| Mihai Daniel 5

Observam un sir de caractere criptat, in MD5 [Mihai Daniel 5 (initiale) => MD5]. Acest hash contine cuvantul "celengi", deci $_GET['celengi'].

Challenge XSS #1

In acest moment putem accesa challenge-ul propriu-zis. Este retaliv simplu, am vrut sa subliniez atentie pentru partea injectata de cod. Partea cea mai "tricky" din challenge (fiecare intelege ce vrea prin "tricky") este ca, cuvintele "alert" si "script" erau filtrate.

Un vector, cred ca cel mai simplu si care poate fi inteles de toata lumea este:

"><a href=x onmouseover=confirm(2)>XSS</a>

Pagina ramane in continuare on, deci puteti sa va exersati "aptitudinile". Succes!

// Cine vrea sursa challenge-ului, PM!

Edited by StoNe-

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...