Vulnforum
DNS Recon
❯ nslookup -type=any vulnforum.co.uk 8.8.8.8
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
Name: vulnforum.co.uk
Address: 68.183.255.206
vulnforum.co.uk nameserver = ns1.digitalocean.com.
vulnforum.co.uk nameserver = ns2.digitalocean.com.
vulnforum.co.uk nameserver = ns3.digitalocean.com.
vulnforum.co.uk
origin = ns1.digitalocean.com
mail addr = hostmaster.vulnforum.co.uk
serial = 1626253208
refresh = 10800
retry = 3600
expire = 604800
minimum = 1800
Authoritative answers can be found from:
❯ dnsrecon -d vulnforum.co.uk -D ~/Dokumente/ctfchallenge/wordlists/subdomains.txt -t brt
[*] Performing host and subdomain brute force against vulnforum.co.uk
[*] A www.vulnforum.co.uk 68.183.255.206
[+] 1 Records FoundVisual Recon - Browsing the Page
Findings
User Names: toby
User UUID: 1ac9c036aaf12a755084dc6a326ed7f5
Login Page: http://www.vulnforum.co.uk/login
Playing with Login Parameters
We open our browsers dev console and try to login using some credentials. It doesn't work but we copy the login also curl command to check it out. Change --data-raw 'username=toby&password=toby&method=local' to --data-raw 'username=toby&password=toby&method=remote'
We've got the first flag and an interesting URL: http://nqorl3vm.auth.vulnforum.co.uk/auth
DNS Recon - Part 2
Let's check our new domain
We found yet another new domain: vulnauth.co.uk Let's verify if it's live
We found another flag!
Subdomain Takeover
We previously found http://nqorl3vm.auth.vulnforum.co.uk/auth which tells us "Invalid Domain" when visiting the page. With the infos we gathered in our previous step it's a good idea to try to register that domain :)
Visit: http://vulnauth.co.uk/ and create an account
Visit: http://nqorl3vm.auth.vulnforum.co.uk (You should be greeted with a login page) Create a new User using the UUID we've discovered previously (1ac9c036aaf12a755084dc6a326ed7f5)
Let's try to login using curl
Great it worked!
Visual Recon - Browsing the Page - As User: Toby
Unfortunately we aren't able to login on the webpage itself due to the "method=local" that is hardcoded. Lets use the cookie we've generated earlier and import it in our browser
Great! We're logged in as toby and find another flag [^FLAG^3B1A170C3033B788FEB1B1A4E45D62CD^FLAG^]
Findings
Post: http://www.vulnforum.co.uk/2/2 => Toby implemented a password reset function
User Names: john => Aadmin
User UUID: 76887c0378ba2b80f17422fb0c0791c4
Visit: http://www.vulnforum.co.uk/settings We're resetting the password to toby123 and now are able to login without any problems.
Last updated