Vulnlawyers
DNS Recon
❯ nslookup -type=any vulnlawyers.co.uk 8.8.8.8
Server: 8.8.8.8
Address: 8.8.8.8#53
Non-authoritative answer:
Name: vulnlawyers.co.uk
Address: 68.183.255.206
vulnlawyers.co.uk nameserver = ns1.digitalocean.com.
vulnlawyers.co.uk nameserver = ns2.digitalocean.com.
vulnlawyers.co.uk nameserver = ns3.digitalocean.com.
vulnlawyers.co.uk
origin = ns1.digitalocean.com
mail addr = hostmaster.vulnlawyers.co.uk
serial = 1626211986
refresh = 10800
retry = 3600
expire = 604800
minimum = 1800
Authoritative answers can be found from:
❯ dnsrecon -d vulnlawyers.co.uk -D ~/Dokumente/ctfchallenge/wordlists/subdomains.txt -t brt
[*] Performing host and subdomain brute force against vulnlawyers.co.uk
[*] A data.vulnlawyers.co.uk 68.183.255.206
[*] A www.vulnlawyers.co.uk 68.183.255.206
[+] 2 Records Found
Visit: http://data.vulnlawyers.co.uk to get the first flag {"name":"VulnLawyers Website API","version":"2.1.04","flag":"[^FLAG^E78DEBBFDFBEAFF1336B599B0724A530^FLAG^]"}
Content Discovery
When visiting http://vulnlawyers.co.uk/login we instantly get redirected to http://vulnlawyers.co.uk/denied which tells us that we can't access that portal with our url Let's use curl to check if we can find some data due to an broken redirect
API Discovery
Back in the DNS Recon Phase we found http://data.vulnlawyers.co.uk to get the first flag. It mentioned an API. Lets check if we can find any useful endpoints
Bruteforcing
We've discovered the login page previously during our content discovery phase. Let's check if we can crack a password by using the infos we've gathered on the api
Let's check the login panel source
using ffuf we will bruteforce the password
After we logged in as [email protected] using the password summer we can find another flag [^FLAG^7F1ED1F306FC4E3399CEE15DF4B0AE3C^FLAG^]
IDOR
While browsing the webportal we find and "Profile" Tab under http://www.vulnlawyers.co.uk/lawyers-only-profile which should let us update our own details. I've tried to change the name and recorded the request in my browsers dev console. It didn't work but I got another URL which seems to be an API for Userdata URL: http://www.vulnlawyers.co.uk/lawyers-only-profile-details/4
Let's check for IDOR Vulnerabilities URL: http://www.vulnlawyers.co.uk/lawyers-only-profile-details/1
URL: http://www.vulnlawyers.co.uk/lawyers-only-profile-details/2 Got another flag
URL: http://www.vulnlawyers.co.uk/lawyers-only-profile-details/3
URL: http://www.vulnlawyers.co.uk/lawyers-only-profile-details/5
Final Flag
Logging in as Shayn Cairns we seem to have permissions to delete cases. Let's examine this. After clicking on "delete case" we get the final flag [^FLAG^B38BAE0B8B804FCB85C730F10B3B5CB5^FLAG^]
Last updated