OWASP-juice-shop-??

OWASP-juice-shop-??

The OWASP Juice Shop is an amazingly vulnerable web application by design used for testing and educational purposes. Please check out the resources below for further information:

OWASP Juice Shop GitHub repository

https://github.com/bkimminich/juice-shop

OWASP Vulnerable Web Applications Directory

https://owasp.org/www-project-vulnerable-web-applications-directory/

A5 - Broken Access Control ?? Admin Section

Our first two star challenge is to access the administration section of the store. To start, let's use the Inspect Element tool in our Firefox browser to see if we can find a reference to the admin section.

No alt text provided for this image

Now, if we search 'admin' in the Debugger section we find a path listed as 'administration'.

No alt text provided for this image

Also take note other interesting paths listed, 'accounting' looks like another particularly interesting path that might be of use down the road.

So now, let's visit the administration section by appending it to the end of the Juice Shop URL.

No alt text provided for this image

Unfortunately we are met with a 403 Forbidden HTTP error status and are not able to access the admin section without a privileged account. Luckily, a few weeks ago, we discovered that this web application is vulnerable to SQL injection and authentication bypass.

So our next step is to login to the admin account utilizing SQL injection to gain authorization then traverse to the 'administration' section of the store.

No alt text provided for this image
No alt text provided for this image

As we can see, once we are logged in with the admin account we are then able to access the administration section of the store, which has a listening of all the registered users for the store and a customer feedback portal with admin privileges. Both of which will be useful in the challenges to come.

A5 - Broken Access Control ?? Five-Star Feedback

Immediately we find the next challenge of getting rid of all 5-star customer feedback because we are playing the role of a nefarious actor and want to eliminate any positive customer feedback for the store (??). Hit trash can delete button next to the five star review and viola!

No alt text provided for this image

A3 - Sensitive Data Exposure ?? Login MC SafeSearch

Now, our next challenge is to log in with MC SafeSearch's original user credentials WITHOUT applying SQL Injection or any other bypass. So we can't use the same SQL injection authentication bypass technique to solve this challenge. Looking at the registered users list we do have a '[email protected]' email to use so let's start there.

No alt text provided for this image

Having only an email address to go off of, we Google 'MC SafeSearch' to gather further information before a password attacker. We are then directed to the YouTube video below.

The lyrics in the music video provide us with his password credentials. We then are able t successfully login in as MC SafeSearch with valid credentials.

No alt text provided for this image
No alt text provided for this image

A5 - Broken Access Control ?? View Basket

Next challenge is to view another user's shopping basket. Let's take a look at our basket to see where we manipulate the parameters

No alt text provided for this image

Looking at the parameters in Burp Suite Repeater, it looks like the basket identification parameters are represented in the GET URL as a numeric value (here, basket 11). So let's test the parameter settings by changing the basket number to see what the response will be from the web server.

No alt text provided for this image
No alt text provided for this image

Now we are able to view the contents in basket 2, as opposed to our original basket 11. This is useful information that we can use down the road.

As we start gathering further customer/employee/admin identification parameters from the web application we can began mapping out the user hierarchy within the database and really start to understand the logic behind the web application.

Knowing how to manipulate the web application in order to get the desired information from the database allows us to maneuver elegantly and continuously Pwn the Juice Shop.

Cheers,

No alt text provided for this image




要查看或添加评论,请登录

Micah J.的更多文章

  • Pruning SMB File Shares

    Pruning SMB File Shares

    Unmanaged Shares SMB file shares are like a data garden within an organization. Just as plants grow and expand, file…

  • OWASP_Juice_Shop ? part_deux

    OWASP_Juice_Shop ? part_deux

    The OWASP Juice Shop is an amazingly vulnerable web application by design used for testing and educational purposes…

    2 条评论
  • OWASP_Juice_Shop ? part_one

    OWASP_Juice_Shop ? part_one

    The OWASP Juice Shop is an amazingly vulnerable web application by design used for testing and educational purposes…

  • Hack The Box - Jerry

    Hack The Box - Jerry

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

    4 条评论
  • Hack The Box - Active

    Hack The Box - Active

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

  • Hack The Box - Devel

    Hack The Box - Devel

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

    2 条评论
  • Hack The Box - Lame

    Hack The Box - Lame

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

    2 条评论
  • Hack The Box - Legacy

    Hack The Box - Legacy

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

  • Hack The Box - Blue

    Hack The Box - Blue

    DISCLAIMER: I am not an expert penetration tester. For all thoughts, opinions, insights, tools, techniques, tactics…

    6 条评论
  • TO START PRESS ANY KEY "Where's the any key?!"

    TO START PRESS ANY KEY "Where's the any key?!"

    Had an “aha!” moment on my penetration testing journey last weekend. Over the holidays, I started Heath Adam’s…

    7 条评论