THM Challenge

less than 1 minute read

3c514ce4b4bf3eb88c1e193655cf7b08.png

/robots.txt has some Disallows

User-agent: *
Disallow: /admin
Disallow: /todo

Admin is a rabbithole. todo actually has some info.

3c514ce4b4bf3eb88c1e193655cf7b08.png

Looks like there’s a new feature that hasn’t been sufficiently tested for security holes.

Register an account to get a look at the member’s area

3c514ce4b4bf3eb88c1e193655cf7b08.png

So we can upload a resume or send a request to the admin? Maybe that’s the form that’s being talked about in todo?

3c514ce4b4bf3eb88c1e193655cf7b08.png

Let’s test this by sending an XSS payload

sent <script>alert(1)</script> in the content field

3c514ce4b4bf3eb88c1e193655cf7b08.png

Interesting, we can review the report? Let’s see if our XSS fired!

3c514ce4b4bf3eb88c1e193655cf7b08.png

So XXS is in play. If the admin is checking, maybe we can steal the cookies?

I’m going to use hookbin and this payload:

3c514ce4b4bf3eb88c1e193655cf7b08.png

Sending that as the content of our request, let’s see if we get anything on our hookbin

3c514ce4b4bf3eb88c1e193655cf7b08.png

Is that the cookie we want? Let’s see what happens if we use that one instead of the one we have

3c514ce4b4bf3eb88c1e193655cf7b08.png

Now we can capture the flag :)