Web Attacks - Skills Assessment

We could actually see that we have the uid 74



when we try to change the uid cookie to 75 we have a different user

Now we try to intercept this page

send it to intruder

We found nothing above
But I found the api

Send it to repeater


Change the password of that user

As we fuff the website we can see the reset.php which is the reset page
ffuf -w /usr/share/wordlists/seclists/SecLists-master/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://94.237.61.84:42330/FUZZ.php

Then i just tried this reset and see the parameters

Then we can just reset the password of admin by a GET method

ORRR

Username from burp when we are bruteforcing the APIs
username: a.corrales
password: 123
Now just login as admin

click add event


We can see there is a xxe or xml that is being transferred


just use the base64 php encode to encode the file /flag.php


Last updated