Follow us on Twitter!
Few are those who can see with their own eyes and hear with their own hearts. - Albert Einstein
Thursday, April 24, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 25
Guests Online: 20
Members Online: 5

Registered Members: 82895
Newest Member: kevy90
Latest Articles

Pent testing 2 walk through

Arrow Image a walk through on the pent testing 2



PentTest 2 Challenge
By synstealth


Before we begin, I would like to emphasize on the knowledge required to beat this challenge. You must have the following skills before being able to understand what you are looking for in this penetration test. Also this site gives out hints and clues on what to look for which definitely makes the challenge a lot easier, so watch out for those clues because you will need it

Skills required to beat this:
Understanding how a website works, knowledge of basic HTML, and knowing where to look.
LFI exploit
XSS exploit
CSRF exploit

First you will want to visit each link you can find on this site, you should be able to find at least one interesting place to perform your attack and don't forget to read the entire site for names, clues and messages.
Now after searching the entire site, we have found two names that are important. Now that we have done the most we can on this site, the login doesn't work, the news section doesn't do much, what about the registration page?
Notice the message says No new users allowed, Sorry What about the admin? We could do something that can be registered as that user? Let's do that
60 pts for overwriting an existing user

After the registration has been a success, the login now works, let's log in with the password you used and you will see on the right side pane, the user information appears with new links.
There links, which we will want to access, on one of those links, it will have a message hint telling you what you can do with it.
10 pts for finding the URL path to *****

Don't forget we are supposed to access a specific name that was mentioned on the website, let's access that somehow
35 pts for viewing the **** directly

Now that we have been accessing the URL, this time let's test some exploits by putting in a single quote ( ‘ ) next to the equal sign ( =' ) in the URL and see what happens. Notice in the title bar, it shows ( \' ). This tells me it is being filtered for quotes, ok that's fine, let's test something else like javascript tags – put in a certain injection that will alert a message, don't forget to close the title before putting in the injection. When you do that. You just performed XSS exploit
30 pts for finding XSS hole

Now back to the profile page, there is one more place where you definitely will want to go to but it also gives you a message major hint telling you what you can do with that link
Find it yet? GREAT Let's move on.
Once you understand the message clearly, you will know what to do with it.
Now this part should be easy because it is a well-known CSRF Cross Site Request Forgery exploit where you can inject something in the field that displays an image.
40 Points for performing CSRF injection

Thank you for reading and hope this is not too much of a spoiler
-synstealth

Comments

Huitzilopochtlion January 21 2014 - 18:44:08
Thumbs Up
Post Comment

Sorry.

You must have completed the challenge Basic 1 and have 100 points or more, to be able to post.