Follow us on Twitter!
Things are more like they are now than they have ever been before. - Dwight D. Eisenhower
Wednesday, April 26, 2017
 Need Help?
Members Online
Total Online: 75
Guests Online: 64
Members Online: 11

Registered Members: 99933
Newest Member: bjoerger
Latest Articles

Pen testing 2 walk through

Arrow Image a walk through on the pen testing 2

Pen Test 2 Challenge
By synstealth

Before we begin, I would like to emphasize on the knowledge required to beat this challenge. You must have the following skills before being able to understand what you are looking for in this penetration test. Also this site gives out hints and clues on what to look for which definitely makes the challenge a lot easier, so watch out for those clues because you will need it

Skills required to beat this;
Understanding how a website works, knowledge of basic HTML, and knowing where to look.
LFI exploit
XSS exploit
CSRF exploit

First you will want to visit each link you can find on this site, you should be able to find at least one interesting place to perform your attack and don't forget to read the entire site for names, clues and messages.
Now after searching the entire site, we have found two names that are important. Now that we have done the most we can on this site, the login doesn't work, the news section doesn't do much, what about the registration page?
Notice the message says No new users allowed, Sorry What about the admin? We could do something that can be registered as that user? Let's do that
60 pts for overwriting an existing user

After the registration has been a success, the login now works, let's log in with the password you used and you will see on the right side pane, the user information appears with new links.
There links, which we will want to access, on one of those links, it will have a message hint telling you what you can do with it.
10 pts for finding the URL path to ***

Don't forget we are supposed to access a specific name that was mentioned on the website, let's access that somehow
35 pts for viewing the *** directly

Now that we have been accessing the URL, this time let's test some exploits by putting in a single quote ' next to the equal sign &=' in the URL and see what happens. Notice in the title bar, it shows \'. This tells me it is being filtered for quotes, ok that's fine, let's test something else like javascript tags - put in a certain injection that will alert a message, don't forget to close the title before putting in the injection. When you do that. You just performed XSS exploit
30 pts for finding XSS hole

Now back to the profile page, there is one more place where you definitely will want to go to but it also gives you a message major hint telling you what you can do with that link
Find it yet? GREAT Let's move on.
Once you understand the message clearly, you will know what to do with it.
Now this part should be easy because it is a well-known CSRF Cross Site Request Forgery exploit where you can inject something in the field that displays an image.
40 Points for performing CSRF injection

Thank you for reading and hope this is not too much of a spoiler


Huitzilopochtlion January 21 2014 - 18:44:08
Thumbs Up
GLA-Hackeron June 23 2014 - 12:00:38
CSRF injection does not work for me.SadSad I used full path, relative path, > thing loged on and out but nothingFrown
omega_tekon March 13 2015 - 12:27:42
Thumbs UpThumbs UpThumbs UpThumbs Up
Post Comment


You must have completed the challenge Basic 1 and have 100 points or more, to be able to post.