Nithissh's Blogs

Total Categories: 21

API Vulnerabilities (4 posts)

Exploiting server-side parameter pollution in a query string

Objective

Exploiting a mass assignment vulnerability

Objective

Finding and exploiting an unused API endpoint

Objective

Exploiting an API endpoint using documentation

Objective

AWS (7 posts)

Pillage Exposed RDS Instances

Initial Entry

Plunder Public RDS Snaphots

Scenario

Leverage Leaked Credentials For Pwnage

Initial Entry

Loot Public EBS Snapshots

The scenario here is Huge Logistics, a titan in their industry, has invited you to simulate an “assume breach” scenario. They’re handing you the keys to their kingdom - albeit, the...

Breach In the Cloud - AWS Cloudtrial Challenge

Initial Entry point

Identify Account ID from a Public s3 Bucket

Initial Entry point

Big IAM Challenge - Wiz CTF Challenge

Introduction

Access Control (13 posts)

Insecure direct object references

Introduction

User ID controlled by request parameter with unpredictable user IDs

Introduction

User ID controlled by request parameter

Introduction

User role can be modified in user profile

Introduction

User role controlled by request parameter

Introduction

Method-based access control can be circumvented

Introduction

Multi-step process with no access control on one step

Introduction

Referer-based access control

Introduction

Unprotected admin functionality with unpredictable URL

Introduction

Unprotected admin functionality

Introduction

URL-based access control can be circumvented

Introduction

User ID controlled by request parameter with data leakage in redirect

Introduction

User ID controlled by request parameter with password disclosure

Introduction

Authentication (12 posts)

Password reset poisoning via middleware

Objective

Password reset poisoning via middleware

Objective

Brute-forcing a stay-logged-in cookie

Objective

Offline password cracking

Objective

Username enumeration via response timing

Objective

Password reset broken logic

Objective

Broken brute-force protection, IP block

Objective

Username enumeration via account lock

Objective

2FA broken logic

Objective

Username enumeration via different responses

Introduction

2FA Bypass

Introduction

Username enumeration via subtly different responses

Objective

BSCP (111 posts)

Exploiting XInclude to retrieve files

Objective

Exploiting XXE via image file upload

Objective

Exploiting XXE using external entities to retrieve files

Objective

Exploiting XXE to perform SSRF attacks

Objective

DOM XSS using web messages

Objective

DOM XSS using web messages and a JavaScript URL

Objective

DOM XSS using web messages and JSON.parse

Objective

DOM-based open redirection

Objective

DOM-based cookie manipulation

Objective

Exploiting server-side parameter pollution in a query string

Objective

Exploiting a mass assignment vulnerability

Objective

Finding and exploiting an unused API endpoint

Objective

Exploiting an API endpoint using documentation

Objective

Remote code execution via polyglot web shell upload

Objective

Web shell upload via Content-Type restriction bypass

Objective

Web shell upload via extension blacklist bypass

Objective

Web shell upload via obfuscated file extension

Objective

Remote code execution via web shell upload

Objective

Web shell upload via path traversal

Objective

Password reset poisoning via middleware

Objective

Password reset poisoning via middleware

Objective

Brute-forcing a stay-logged-in cookie

Objective

Offline password cracking

Objective

Username enumeration via response timing

Objective

Password reset broken logic

Objective

Broken brute-force protection, IP block

Objective

Username enumeration via account lock

Objective

2FA broken logic

Objective

Username enumeration via different responses

Introduction

2FA Bypass

Introduction

Username enumeration via subtly different responses

Objective

CORS vulnerability with basic origin reflection

Introduction

CORS vulnerability with trusted insecure protocols

Introduction

CORS vulnerability with trusted null origin

Introduction

Basic SSRF against another back-end system

Introduction

Basic SSRF against the local server

Introduction

Blind SSRF with out-of-band detection

Introduction

SSRF with blacklist-based input filters

Introduction

SSRF with filter bypass via open redirection vulnerability

Introduction

Insecure direct object references

Introduction

User ID controlled by request parameter with unpredictable user IDs

Introduction

User ID controlled by request parameter

Introduction

User role can be modified in user profile

Introduction

User role controlled by request parameter

Introduction

Method-based access control can be circumvented

Introduction

Multi-step process with no access control on one step

Introduction

Referer-based access control

Introduction

Unprotected admin functionality with unpredictable URL

Introduction

Unprotected admin functionality

Introduction

URL-based access control can be circumvented

Introduction

User ID controlled by request parameter with data leakage in redirect

Introduction

User ID controlled by request parameter with password disclosure

Introduction

Blind OS command injection with out-of-band interaction

Objective

Blind OS command injection with out-of-band data exfiltration

Objective

Authentication bypass via information disclosure

Objective

Information disclosure in error messages

Objective

Information disclosure in version control history

Objective

Information disclosure on debug page

Objective

Source code disclosure via backup files

Objective

OS command injection, simple case

Objective

Blind OS command injection with time delays

Objective

Blind OS command injection with output redirection

Objective

CSRF vulnerability with no defenses

Objective

SameSite Strict bypass via sibling domain

Objective

File path traversal, simple case

Objective

File path traversal, traversal sequences blocked with absolute path bypass

This lab contains a path traversal vulnerability in the display of product images.

File path traversal, traversal sequences stripped non-recursively

This lab contains a path traversal vulnerability in the display of product images.

File path traversal, traversal sequences stripped with superfluous URL-decode

Objective

File path traversal, validation of file extension with null byte bypass

Objective

File path traversal, validation of start of path

Objective

SameSite Strict bypass via client-side redirect

Objective

CSRF where token is tied to non-session cookie

Objective

CSRF with broken Referer validation

Objective

SameSite Lax bypass via method override

Objective

SameSite Lax bypass via cookie refresh

Objective

CSRF where Referer validation depends on header being present

Objective

CSRF where token is duplicated in cookie

Objective

CSRF where token validation depends on request method

Objective

CSRF where token validation depends on token being present

Objective

CSRF where token is not tied to user session

Objective

Reflected XSS in canonical link tag

Intro

Reflected XSS into a JavaScript string with single quote and backslash escaped

Intro

Reflected XSS into a JavaScript string with Angle Brackets and HTML encoded

Intro

Stored XSS into onclick event with angle brackets and double quotes HTML-encoded

Intro

Reflected XSS into a template literal with angle brackets, single, double quotes

Intro

Reflected XSS with Some SVG markup Allowed

Intro

Exploiting cross-site scripting to steal cookies

Initial Information

Exploiting cross-site scripting to capture passwords

Initial Information 

Exploiting XSS to perform CSRF

Intro 

Reflected XSS into HTML context with most tags and attributes blocked

Intro

SQL injection with filter bypass via XML encoding

Objective

DOM Based XSS in document.write sink using source location.search inside a select element

Intro

DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded

Intro

Reflected DOM XSS

Objective

Stored DOM XSS

Objective

Blind SQL injection with out-of-band interaction

Objective

Blind SQL injection with out-of-band data exfiltration

Objective

Blind SQL injection with time delays and information retrieval

Objective

Blind SQL injection with time delays

Objective

Blind SQL injection with conditional responses

Objective

Blind SQL injection with conditional errors

Objective

SQL injection vulnerability allowing login bypass

Objective

SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Objective

SQL injection attack, listing the database contents on Oracle

Objective

SQL injection attack, listing the database contents on non-Oracle databases

Objective

SQL injection UNION attack, retrieving data from other tables

Objective

SQL injection UNION attack, retrieving multiple values in a single column

Objective

SQL injection UNION attack, determining the number of columns returned by the query

Objective

SQL injection UNION attack, retrieving data from other tables

Objective

SQL injection attack, querying the database type and version on MySQL and Microsoft

Objective

SQL injection attack, querying the database type and version on Oracle

Objective

Bugbounty (4 posts)

Leaked Database and SMTP credentials through .env file

Introduction

RCE on Application’s Tracking Admin Panel

In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The application...

A Tale of Weird XSS into $100

Introduction

A story of Default wordlist in Dirsearch to 20k INR Bounty

Introduction

CORS (3 posts)

CORS vulnerability with basic origin reflection

Introduction

CORS vulnerability with trusted insecure protocols

Introduction

CORS vulnerability with trusted null origin

Introduction

CTF (1 posts)

Cozyhosting - HTB Walkthrough

Introduction

CTFs (5 posts)

Gandalf Lakera AI - Prompt Injection Challenge

Introduction Gandalf is a prompt injection challenge provided by an AI security company called Lakera where they do engage AI security research activities and alot more.. So this challenge is...

Sau - HTB Walkthrough

Introduction Easy level CTF lab machine of the HackTheBox platform running Linux containing public exploits, SSRF, RCE. Enumeration Phase Let’s start by enumerating the machines with nmap: sudo nmap -sC...

Analytics - HTB Walkthrough

Introduction

Keeper - HTB Walkthrough

Introduction Easy level HackTheBox platform lab machine running Linux OS, containing a standard password, password transmission using an open communication channel and its untimely change, exploiting a vulnerability in Keepass....

Hunt for Secrets in Github Repositories

Initial Entry Point

Command Injection (5 posts)

Blind OS command injection with out-of-band interaction

Objective

Blind OS command injection with out-of-band data exfiltration

Objective

OS command injection, simple case

Objective

Blind OS command injection with time delays

Objective

Blind OS command injection with output redirection

Objective

DOM Based (5 posts)

DOM XSS using web messages

Objective

DOM XSS using web messages and a JavaScript URL

Objective

DOM XSS using web messages and JSON.parse

Objective

DOM-based open redirection

Objective

DOM-based cookie manipulation

Objective

File Upload Vulnerabilities (6 posts)

Remote code execution via polyglot web shell upload

Objective

Web shell upload via Content-Type restriction bypass

Objective

Web shell upload via extension blacklist bypass

Objective

Web shell upload via obfuscated file extension

Objective

Remote code execution via web shell upload

Objective

Web shell upload via path traversal

Objective

GCP (2 posts)

Reveal Hidden Files in Google Storage

Initial entry point

Exploit SSRF with Gopher for GCP Initial Access

Scenario

Information disclosure (5 posts)

Authentication bypass via information disclosure

Objective

Information disclosure in error messages

Objective

Information disclosure in version control history

Objective

Information disclosure on debug page

Objective

Source code disclosure via backup files

Objective

Path Traversal (6 posts)

File path traversal, simple case

Objective

File path traversal, traversal sequences blocked with absolute path bypass

This lab contains a path traversal vulnerability in the display of product images.

File path traversal, traversal sequences stripped non-recursively

This lab contains a path traversal vulnerability in the display of product images.

File path traversal, traversal sequences stripped with superfluous URL-decode

Objective

File path traversal, validation of file extension with null byte bypass

Objective

File path traversal, validation of start of path

Objective

SQLi (17 posts)

SQL injection with filter bypass via XML encoding

Objective

Blind SQL injection with out-of-band interaction

Objective

Blind SQL injection with out-of-band data exfiltration

Objective

Blind SQL injection with time delays and information retrieval

Objective

Blind SQL injection with time delays

Objective

Blind SQL injection with conditional responses

Objective

Blind SQL injection with conditional errors

Objective

SQL injection vulnerability allowing login bypass

Objective

SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Objective

SQL injection attack, listing the database contents on Oracle

Objective

SQL injection attack, listing the database contents on non-Oracle databases

Objective

SQL injection UNION attack, retrieving data from other tables

Objective

SQL injection UNION attack, retrieving multiple values in a single column

Objective

SQL injection UNION attack, determining the number of columns returned by the query

Objective

SQL injection UNION attack, retrieving data from other tables

Objective

SQL injection attack, querying the database type and version on MySQL and Microsoft

Objective

SQL injection attack, querying the database type and version on Oracle

Objective

SSRF (5 posts)

Basic SSRF against another back-end system

Introduction

Basic SSRF against the local server

Introduction

Blind SSRF with out-of-band detection

Introduction

SSRF with blacklist-based input filters

Introduction

SSRF with filter bypass via open redirection vulnerability

Introduction

XXE (4 posts)

Exploiting XInclude to retrieve files

Objective

Exploiting XXE via image file upload

Objective

Exploiting XXE using external entities to retrieve files

Objective

Exploiting XXE to perform SSRF attacks

Objective

linux (2 posts)

OverTheWire: Bandit Walkthrough (Levels 14-34)

Welcome back to the walkthrough of the Bandit wargame from OverTheWire. If you haven’t checked out Part 1 covering levels 0-13, make sure to do that first. Let’s dive into...

OverTheWire: Bandit Walkthrough (Levels 0-14)

The Bandit wargame on OverTheWire is aimed at absolute beginners and teaches the basics of remote server access and Linux command line skills. This post will walk through the solutions...