Active Members dancezar Posted May 24, 2013 Active Members Report Posted May 24, 2013 (edited) Target:http://danyweb09.byethost7.com/Dificultate:Usor poate mediuScopul:Sa gasiti o vurnerabilitate in site care sa va permita sa accesati panoul de administrare si sa va postati numele pe pagina principala.Reguli:-Nu dati hinturi este prea usor-Pe pagina de index sa apara numele nickul vostru real pe care il folositi pe RST-Daca nu ati postat nickul vostru real am sa postez la solvers exact ce nume este acoloLa sfarsit am sa postez si rezolvarea+++Solvers+++-shark0der-Stone-shaggi-ionut97-renegade-roby4kill-reyChallenge closedFelicitati tuturod desi uni nu au inteles care era scopul acestui challRezolvare:Partea vurnerabila era http://danyweb09.byethost7.com/download.php?file=doc1.doc aceasta vurnerabilitate se numeste Souce Code Discloure si permite atacatorului sa descarce orice fisier de pe server.1)Incepem prin a descarca fisierul download.phphttp://danyweb09.byethost7.com/download.php?file=download.php2)Ne uitat in codul sursa si observam urmatoarea contitieif($_GET['file']=="login.php"||$_GET['file']=="register.php"||$_GET['file']=="chall3.php"||$_GET['file']=="xss.php"||$_GET['file']=="suleiman/cf.php"||$_GET['file']=="index.php"||$_GET['file']=="./login.php"||$_GET['file']=="./register.php"||$_GET['file']=="./chall3.php"||$_GET['file']=="./xss.php"||$_GET['file']=="./suleiman/cf.php"||$_GET['file']=="./index.php")Deci este ceva intezis in directorul suleiman3)Cu ajutorul unui admin page finder cautam pagina de admin in directorul http://danyweb09.byethost7.com/suleiman/Si gasim pagina de administrator la http://danyweb09.byethost7.com/suleiman/admin.php4)Observam ca nu putem trece de acest login prin Sql injection.Ne folosim de acelasi SCD pentru a vedea ce este in pagina sursa a paginei de administrator.O descarca in felul urmator http://danyweb09.byethost7.com/download.php?file=./suleiman/admin.php5)In codul sursa gasim urmatoarea conditieif($_POST['user']=="danyweb09"&&md5($_POST['pass'])=="8ad550447551e33feeb60179a3e4e3a2")Deci userul este danyweb09 si parola este criptata in md5 v-a trebui sa o decriptati cu orice soft doriti sau cautand hashu pe google. Edited June 20, 2013 by danyweb09 Quote
shaggi Posted May 24, 2013 Report Posted May 24, 2013 http://shaggi.1.ai/chall.php COAILIII v3.1.3.3.7 Quote
StoNe- Posted May 24, 2013 Report Posted May 24, 2013 Nice challenge - de ghicit. PS: Mai aranjeaza scripturile. Quote
1337 Posted May 24, 2013 Report Posted May 24, 2013 --->Access to this site has been temporarily denied. This is due to the site receiving high levels of concurrent traffic. Once the traffic reduces below the limit access will be restored. If you are the webmaster and are seeing this often you should consider upgrading at http://ifastnet.com/portal Quote
yoyois Posted May 24, 2013 Report Posted May 24, 2013 Access to this site has been temporarily denied. This is due to the site receiving high levels of concurrent traffic. Once the traffic reduces below the limit access will be restored. If you are the webmaster and are seeing this often you should consider upgrading at http://ifastnet.com/portalAsta face parte din Challenge? Quote
Active Members dancezar Posted May 24, 2013 Author Active Members Report Posted May 24, 2013 Acuma merge Quote
Active Members dancezar Posted May 24, 2013 Author Active Members Report Posted May 24, 2013 (edited) WTF? cei cu tine? Edited June 20, 2013 by MrRip Quote
Active Members dancezar Posted May 24, 2013 Author Active Members Report Posted May 24, 2013 eu cred ca,cauti unde nu trebuie asta nu este xss challenge este o alta vurnerabilitate . aici trebuie sa cauti http://danyweb09.byethost7.com/chall4.php Quote
Silviu Posted May 24, 2013 Report Posted May 24, 2013 Eu mi-am dat seama de acel LFD, dar am ramas in pana de idei. Quote
hackerika Posted May 25, 2013 Report Posted May 25, 2013 (edited) edited Edited May 25, 2013 by hackerika Quote
Renegade Posted May 25, 2013 Report Posted May 25, 2013 nu am putut rezista la munca in tura de noapte pana nu am arestat laptopul colegei de tura ca sa fac acest challenge Quote
Active Members dancezar Posted May 25, 2013 Author Active Members Report Posted May 25, 2013 suspendat pentru o ora din motive de prostie Quote
Nokia94 Posted May 25, 2013 Report Posted May 25, 2013 suspendat pentru o ora din motive de prostieCare motiv? Quote
Active Members dancezar Posted May 25, 2013 Author Active Members Report Posted May 25, 2013 (edited) Din cauza lui Sharkcode care se da mare smecher ca a gasit si el SCD si gata face faze pe indexul meuinitial:challenge 4(sa imi suga pula tristisor)sharck s-a simtitDupa:challenge 4(sa imi suga pula tristisor)(then my friend ... you've got 99 problems and a bitch ain't on)Dupa am modificat eu la locApoi elchallenge 4(sa imi suga pula tristisor)(As vrea sa am pula mare)Dupa am modificat eu challenge 4(sa imi suga pula tristisor) Am pula mareDupa iar elchallenge 4(sa imi suga pula tristisor) Uneori imi imaginez ca am pula mareApoi euchallenge 4(sa imi suga pula tristisor) Uneori imi imaginez ca am pula mica ...din pacat am pula asa de mare incat nu ma pot minti singurApoi elchallenge 4(sa imi suga pula tristisor) Uneori am pula mare ....Numai ca alti mi-a iau inainteApoi eu challenge 4(sa imi suga pula tristisor) Uneori am pula mare ....Numai ca alti mi-a iau inainte...in guraDupa s-a suparat mi-a sters indexul si mi-a lasat mesajHai sa fim rai?Apoi eu Hai sa imi sugi pulaApoi am modificat cum este acumNu v-a dura mult pana rezolv problema ca datele de logare pe beythost nu poti sa ai o parola diferita la Control Panel si alta la baza de date.Am sa mut baza de date pe alt server sau vad eu cum fac.//S-a rezolvat Edited May 25, 2013 by danyweb09 Quote
shark0der Posted May 25, 2013 Report Posted May 25, 2013 (edited) Nu te mai plange ca o femeie, SCD-ul nu era lasat cu intentia sa vada toti parola ta, daca intr-adevar ai fi vrut sa lasi SCD, trebuia sa o faci cu grija.PWND again!Si ca sa stii si cum am intrat de la bun inceput si pe tot parcursul challenge-ului:P.S. I feel your pain, bro:P.P.S. Pentru ca am fost intrebat de mai multe ori ce tool am folosit, here it is:https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Edited May 26, 2013 by shark0der Quote
hackerika Posted June 20, 2013 Report Posted June 20, 2013 Pe cat de usor parea pe atat de deruntat a fost...si bataie mare de cap..fain chall, mersi.Sper sa mai vii cu altele de genul. Quote