Pico CTF- Web exploitation walkthrough #Part-3 (11–20)
Harshleen chawla
Masters in Cybersecurity | Security Tester | Exploring Blockchain & Web3 | Technical Content Writer | Content Creator
11. Don't-use-client-side
Client-side vulnerabilities refer to security weaknesses in web applications that can be exploited by attackers through the user’s browser or client-side code
Steps- start the instance
12. It is my Birthday
13. login
(async()=>{
await new Promise((e=>window.addEventListener("load", e))),
document.querySelector("form").addEventListener("submit", (e=>{
e.preventDefault();
const r = {
u: "input[name=username]",
p: "input[name=password]"
}
, t = {};
for (const e in r)
t[e] = btoa(document.querySelector(r[e]).value).replace(/=/g, "");
return "YWRtaW4" !== t.u ? alert("Incorrect Username") : "cGljb0NURns1M3J2M3JfNTNydjNyXzUzcnYzcl81M3J2M3JfNTNydjNyfQ" !== t.p ? alert("Incorrect Password") : void alert(`Correct Password! Your flag is ${atob(t.p)}.`)
}
))
}
)();
14. On Includes
15. Inspect HTML
HTML page vulnerabilities work by exposing sensitive information within the page’s source code, which can be accessed through Inspect Element. This information, such as hidden form fields, comments, or scripts, can be easily viewed and exploited by attackers.
16. Local Authority
领英推荐
In web exploitation, a vulnerability where a password is present in the source page means that sensitive information, like passwords or access tokens, is directly visible in the source code of a web application’s webpage. This visibility poses a significant security risk because anyone who can access the source code can see these sensitive details.
17. Search source
The vulnerability in the style.css file arises when it contains sensitive information that should not be publicly accessible. This could include credentials (like usernames and passwords) or security tokens (such as API keys or access tokens) that are crucial for authenticating and authorizing access to protected resources.
18. find me
This vulnerability occurs when a web application exposes internal objects or resources (such as files, directories, or database records) without proper authentication or authorization checks. It allows attackers to manipulate parameters or request types to access unauthorized data or functionalities.
GET /next-page/id=cGljb0NURntwcm94aWVzX2Fs
cGljb0NURntwcm94aWVzX2FsbF90aGVfd2F5X2RmNDRjOTRjf
19. MatchTheRegex
This vulnerability occurs when a web application fails to properly validate and authorize user access to internal objects or resources. In your case, the URL manipulation allows direct access to a sensitive resource (the flag) without appropriate authentication or authorization.
By appending “/flag” to the URL, an attacker can exploit this vulnerability to bypass any access controls or restrictions that should prevent unauthorized users from accessing the flag.
Exploiting an IDOR vulnerability can lead to unauthorized access to sensitive data or functionalities within the application, potentially exposing confidential information or compromising system security.
20. Unminify