Web Attacks - Skills Assessment
Last updated
Last updated
We could actually see that we have the uid 74
when we try to change the uid cookie to 75 we have a different user
Now we try to intercept this page
send it to intruder
We found nothing above
But I found the api
Send it to repeater
Change the password of that user
As we fuff the website we can see the reset.php which is the reset page
Then i just tried this reset and see the parameters
Then we can just reset the password of admin by a GET method
ORRR
Username from burp when we are bruteforcing the APIs
Now just login as admin
click add event
We can see there is a xxe or xml that is being transferred
just use the base64 php encode to encode the file /flag.php