rootđź’€bl4ck4non-sec:~#

Hack. Eat. Sleep. Repeat!!!

View on GitHub

API 01


image

Our task is to get the stored key in the admin’s account

Navigate to the webpage

image

Lets create an account

image image

Lets create a secret

image image

Now, lets fire up burpsuite, we’ll capture this request and send it over to burp repeater

image

What happens when we change the 2 to 3??? Well, lets find out

image

Alright, so that’s the secret I created.

How about we change it to 1

image

We got the key,

Submitting the key

image

We have sucessfully completed this exercise


API 02


image

Our task is to get the stored key located in the admin user’s account

Navigate to the webpage

image

So, we’ll signup and try to create a new secret

image

Now, we’ll capture this request using burpsuite and send it over to burp repeater

image

Changing the number doesn’t work as it did in the previous lab.

Take a loot at the jwt token been used

image

We can check the contents of this token using an online tool, you can access it here

image

Lets change the id to 1. Then we copy the new token that’ll be generated and replace it with the former one on burpsuite

image image

So we got an error, that says the secret is not owned by the user. Lets change /api/secrets/2 to /api/secrets/1 since we are trying to view the admin’s secret

image

We got the ket hehe

Submitting it

image

We have successfully completed this exercise


API 03


image

Our task is to get the key that solves this lab and this key is located in the admin user’s account

Navigate to the webpage

image

Lets create and account, then we try to create a new secret

image

Now, lets capture this request using burpsuite and send it over to burp repeater

image

This lab is similar to the previous lab, just that in this lab we have to get the secret key before we can edit the content of the token

We’ll be using a tool called hashcat to try to get the secret.

command:hashcat -m 16500 -a 0 jwt_token.txt /usr/share/wordlists/rockyou.txt

image

cool, we got the secret to be secret, now lets edit the token with the online website we used earlier

image

As you can see, from the above screenshot, I changed the id to 1 and also provided the secret phrase.

Now lets copy that token and replace it with the former one

image

Changing /api/secrets/2 to /api/secrets/1 should get us the key

image

Submitting the key

image

We have successfully completed this labs


API 04


image

Our is to review the JavaScript of the page to find a hidden endpoint.

Navigate to the webpage

image

Checking the page source

image

Lets take a look at what’s in the js file. Well, I found this

image

Well, that’s an endpoint. Lets analayze what’s here. To do this, navigate to the webpage and capture the request using burpsuite

image

We’ll be using a POST request for this

image

coo, we got the key

Submitting it

image

We have successfully completed this exercise


API 05


image

Our task is to review the JavaScript of the page to find a hidden endpoint. But this time the code has been compressed

Navigae to the webpage

image

Checking the page source

image image

You can use this to deobfuscate this javascript code

image

Copying the output, I found the endpoint

image

Lets analyze the endpoing /get_more_secret

Navigate to the webpage, capture the request using burpsuite and send it over to burp repeater. Also, change the request method to POST

image

Nice, we got the key

Submitting the key

image

We have successfully solved this exercise


API 06


image

Our task is to review the JavaScript of the page to find a hidden endpoint. But this time the code is being conpressed

Navigate to the webpage

image

Lets view the page source

image image

Lets deobfuscate the script using the same method we used in the previous lab

image

nice, we got the endpoint.

Not to waste time, repeating the same thing we did in the previous labs gets us the key


API 07


image

Our task is to review the JavaScript of the page to find an information leak.

Navigate to the webpage

image

We get this login page

Checking the source code and analyzing the javascript file, I found the key

image

Submitting the key

image

We have successfully completed this exercise


API 08


image

Our task is to review the responses from the different API endpoints, to find an information leak allowing you to get logged in as admin@libcurl.so and get the key for this challeng

Navigate to the webpage

image

We have a login page, lets try to register an account

image image

So we have to be logged in with the admin’s email address

Checking the login page, you’ll see there’s a reset email function. Since we don’t know the password of the admin email address lets reset the password

image image

We don’t have access to check the mail lool. Lets try to reset again but this time we’ll capture the request on burpsuite and send it over to burp repeater

image

You can see we got the url for the password reset.

Navigate to that url

image

Lets provide a password to reset the account

image image

Now lets login with the password we used to reset

image

We got the key hehe

submitting the key

image

We have successfully completed this exercise

That will be all for today

Back To Home