Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
SwitchyOmega or SwitchyProxy or similar
burp and/or zap (links up)
curl
dirbuster and/or gobuster (links up)
wappalyzer
docker
TODO: read about stuff in presentation
how it looks like
urls and resources
methods and response codes
headers, cookies, params
content types and encodings
dev console
TODO: setup the burp
how do we catch requests
burp
zap
TODO: go to https://aghws.jctf.pl/lab1/strange- ... somehow
@app .route ('/strange-!?"#$%&\' ()*+,-./:;/<string:t1>' )
def strange (t1 ):
is_ok = True
t1 = unquote (t1 )
if t1 != '!?"#$%&\' ()*+,-./:;' :
is_ok = False
if 't2=' not in request .args or request .args ['t2=' ] != ';:/.-,+*)(\' &%$#"?!<>' :
is_ok = False
if is_ok :
return 'Ok, you made it'
else :
return 'Nope'
run the code locally
complete the challenge step by step - first get to the valid route, then one param, then another
make debug prints in the code to uderstand what is wrong
bruting & recon - wappalyzer, curl
TODO: find what language/server the app uses
TODO: didn't have time at the lab, but checkout curl
tool and use it for bruteforcing
curl
seclists
python & IDOR - busting with automation
TODO: use python for next lab task
You can’t perform that action at this time.