❯nslookup-type=anyvulnlawyers.co.uk8.8.8.8Server:8.8.8.8Address:8.8.8.8#53Non-authoritativeanswer:Name:vulnlawyers.co.ukAddress:68.183.255.206vulnlawyers.co.uknameserver=ns1.digitalocean.com.vulnlawyers.co.uknameserver=ns2.digitalocean.com.vulnlawyers.co.uknameserver=ns3.digitalocean.com.vulnlawyers.co.ukorigin=ns1.digitalocean.commailaddr=hostmaster.vulnlawyers.co.ukserial=1626211986refresh=10800retry=3600expire=604800minimum=1800Authoritativeanswerscanbefoundfrom:❯dnsrecon-dvulnlawyers.co.uk-D~/Dokumente/ctfchallenge/wordlists/subdomains.txt-tbrt[*] Performing host and subdomain brute force against vulnlawyers.co.uk[*] A data.vulnlawyers.co.uk 68.183.255.206[*] A www.vulnlawyers.co.uk 68.183.255.206[+] 2 Records Found
Visit: http://data.vulnlawyers.co.uk to get the first flag {"name":"VulnLawyers Website API","version":"2.1.04","flag":"[^FLAG^E78DEBBFDFBEAFF1336B599B0724A530^FLAG^]"}
<!DOCTYPEhtml><html lang="en"><head><metacharset="utf-8"><metahttp-equiv="X-UA-Compatible"content="IE=edge"><metaname="viewport"content="width=device-width, initial-scale=1"><title>VulnLawyers-OldLogin</title><linkhref="/css/bootstrap.min.css"rel="stylesheet"><linkhref="/template-manager/style.css"rel="stylesheet"></head><body><div class="container"><divclass="row"><divclass="col-md-12"><h1style="padding-top:100px;text-align: center;color: #060505;letter-spacing: -1px;font-weight: bold">VulnLawyers</h1><h3class="text-center">We'll win that case!</h3> </div> </div> <div class="row"> <div class="col-md-6 col-md-offset-3"> <div class="alert alert-info"> <p>Access to this portal can now be found here <a href=/lawyers-only">/lawyers-only</a></p> <p>[^FLAG^FB52470E40F47559EBA87252B2D4CF67^FLAG^]</p> </div> </div> </div></div><script src="/js/jquery.min.js"></script><script src="/js/bootstrap.min.js"></script></body></html>
API Discovery
Back in the DNS Recon Phase we found http://data.vulnlawyers.co.uk to get the first flag. It mentioned an API. Lets check if we can find any useful endpoints
We've discovered the login page previously during our content discovery phase. Let's check if we can crack a password by using the infos we've gathered on the api
After we logged in as jaskaran.lowe@vulnlawyers.co.uk using the password summer we can find another flag [^FLAG^7F1ED1F306FC4E3399CEE15DF4B0AE3C^FLAG^]
Logging in as Shayn Cairns we seem to have permissions to delete cases. Let's examine this. After clicking on "delete case" we get the final flag [^FLAG^B38BAE0B8B804FCB85C730F10B3B5CB5^FLAG^]