[WEB] Freelancer

Very nice challenge! Feel free PM me if you stuck staring on hash like I did lol

Could anyone give me a hint? I’ve got the password hash and login page. I tried using the tool to somehow crack the hash, no luck. What am I missing? what is the OWASP top 10 thing that everyone is talking about?

If anyone could DM some hints, that would be appreciated

i can’t find login page… any hints

I’ve found the path vulnerable to OWASP Top 10, credentials and login page. Could someone give me a hint?

i can’t find update wordlist … can anyone help me :frowning:

Type your comment> @abir2468 said:

i can’t find update wordlist … can anyone help me :frowning:

You don’t quite need a special wordlist. I’ve used the default dirbuster list. The key is to look at the right file.

can anybody help me with this i got the login page and the tool everybody is talking about i think i figured it out but it didnt give me any results can anyone please pm me so that i can clear my doubts…

i am not able to go further after finding the hash anyone pls dm or pm me …

please pm me

I’ve got the account,hash and login page. Tried fuzzing pass but no success. Any tips.
Found it : Use tool, help menu and read files.

Without the little helps here this one would have been impossible…

Hello guys, same problem. I’m stuck in the same point: I have got credential and login page. No luck with injection in login page. I have found other 2 pages:
one give me a 302, I tried some parameters with no luck.
the other is a contact page where parameters seems not to be injectable. In the source file I have found a comment referring a line 19 of PHP file but I cannot correlate these info… Please give me a hint, I’m blocked since 1 week…

Type your comment> @j0ta1982 said:

Hello guys, same problem. I’m stuck in the same point: I have got credential and login page. No luck with injection in login page. I have found other 2 pages:
one give me a 302, I tried some parameters with no luck.
the other is a contact page where parameters seems not to be injectable. In the source file I have found a comment referring a line 19 of PHP file but I cannot correlate these info… Please give me a hint, I’m blocked since 1 week…

you can PM me

use the tools deeper is better than brute-force anything

Found the injectable page, he login page, username and password hash but i don’t know what to do now, can anyone help me??
I read the code but nothing more than the first injectable page, and can’t find the tool’s “magic option” you all talking about .
Some hint or PM pls, i’m being crazy.
Thank you all.

hi h@x0r$. used the sp tool against the p**o.**p script to dump all from the dbs, able to get username and hashed password, tried to use dirb and gobuster to scan all folders for hidden files, can’t find anything other than .ht, .htaccess, .htpasswd files which can’t read. plz h3lp.

WOW, I really need to thanks you for immediately telling that brute forcing the hash is not the correct way to go, actually you need only a couple of tools to find everything you need.

Hi. I’ve used the sp tool against the p*****o.**p file but cannot bypass the waf using the tr scripts. Can anyone assist me?

Hey, I am kinda stuck after using the s****p tool. I found the hash and login page. Not to sure what people refer to when saying the certain tool can be used for other purposes. I have looked at the -h menu. Nothing really stood out.

wrong discuss…