Exploiting. Part 2: Web & OS
We discuss several cybersecurity subjects in a practical manner:
Web application endpoint discovery
Web static analysis
Injection Attacks
OS exploitation
- Slides for this session:
Tasks
Instal
dirbandwordlistsvia the following command:sudo apt install dirb wordlists
Use the
/usr/share/dirb/wordlists/common.txtwordlist and perform endpoint brute-forcing.The target is
http://141.85.224.104:40000.The more you look at it, the less you see. This target is a silent-speaker.
There might invisible things embedded in the web page.
See if you can GET some file.
The file that you want is located under the
/flagpath.Your target is
http://141.85.224.104:40001/index.php.Give me a fixed ping and I will give the whole flag.
Access
http://141.85.224.104:40002/index.phpand read the/flagfile.Previous one was easy.
Can you still do it when some characters are stripped?
Access
http://141.85.224.104:40002/harder.phpand read the same/flagfile again.
Could you please inject some sql into this target? Keep it simple. Like… really simple.
At
http://141.85.224.104:40003/index.phpthere is a vulnerable login page.You can login as
ctfwith passwordctf.However, the
ctfuser does not have access to any interesting information.Can you find out the secret of user
admin?Download the vulnerable virtual machine Ubuntu10-exploit.zip. Login as
studentwith passwordstudent. Try to exploit the kernel to obtain root shell. Alternatively, you can download Ubuntu 10.04 desktop amd64 and set it up into your own virtual machine.Hint: Exploit Database is an archive of public exploits corresponding to vulnerable software.
(Bonus): Do as many challenges from https://alf.nu/alert1 as you can :)