would anyone be able to help with this one? i think i’ve worked out a tactic but whenever i sign something with a different algorithm and use the new value, i get an Internal server error.
edit: nm, i did as recommended and ran the app locally. tweaked my tactic and it works now.
So i read the source and know there exists a S*** attack. I’ve started a local instance but am not sure how to properly escape certain chars in sqlite queries.
I got the exploit and (I believe) finished the challenge but I have no idea on how to get the flag
No tools used right now, I’m doing all manually + nodejs coding.
solved! thx to @daverules for the help , I’ve learnt something new about queries
would anyone be able to help with this one? i think i’ve worked out a tactic but whenever i sign something with a different algorithm and use the new value, i get an Internal server error.
edit: nm, i did as recommended and ran the app locally. tweaked my tactic and it works now.
if you get an internal error then it means the format of something is not quite right. in my case, it was that i was missing a line break at the end of something else . hope that helps
Hmm found a certain ‘private’ something… Not sure what to do with it though
Any hint on how to get that “private” thing? I don’t see any way in the code to access that file…
@HumanFlyBzzzz’s message is a bit confusing and may lead to wrong assumptions. I would recommend to forget about private stuff and instead just carefully read the source code. Most probably you already have everything you need to get the flag.
it took me soooo much time, but since I’m a dumb noob, I guess it’s okay
learned a lot of new things
wrote my own python script (also covered it with a test, lol)
practiced some stuff
I thought I would never do it, but I just didn’t give up, despite it was sooo much pain for me and frustration )))
helping tips for the noobs like me:
something happens as you log in;
can you fake the identity? ← this can take some time; practice on some dummy data first! writing a script to automate the process is a good idea, it’ll help you later on your journey a lot; also, mind an excessive new line somewhere in public!
no escape is a way in;
combine the two and go a blindfolded journey to read the stored treasure;
sorry, I can’t help you with a personal assistance, please don’t dm me.
Great challenge, took me 2 days to solve it. I learned a lot about the authentication system used in the web application. There is one thing i did not understand though:
I had to specify the management system in the tool i’ve used to obtain the flag. Otherwise the tool would not detect the vulnerability. Usually the tool does this automatically but not in this case. Is it because of the custom script I had to create for the tool or am I missing something?
Solved, first challenge 100% on me.
It was fun, great lesson on how to pay attention in tiny details (e.g. \n, spaces).
The fast way was to do everything manually once to try to get a positive feedback, and only then a little coding. Having something that you know already works is great for comparison when scripting.
For tips, dm me