GeorgeBanu
  • About me
  • Pentesting CheatSheets
    • Information Gathering
    • Ports Enumeration
      • FTP-21
      • SSH-22
      • Telnet-23
      • SMTP - 25,465,587
      • DNS-53
      • NetBIOS, SMB - 139,445
      • SNMP-161
      • MySQL-3306
      • RDP-3389
      • WinRM-5985
    • Web Cheat Sheet
    • Privilege Escalation
      • Linux Enumeration
      • Linux Privesc Techniques
    • Tricks
    • Template
  • TryHackMe Writeups
    • Starter
    • Dreaming
    • ColddBox: Easy
    • Ollie
    • Blog
    • KoTH Hackers
    • Brooklyn Nine Nine
    • Chill Hack
    • Undiscovered
    • Archangel
    • Jason
    • GLITCH
    • VulnNet: Node
    • Road
    • VulnNet:Internal
    • W1seGuy
  • CyberEDU Writeups
    • flag-is-hidden
    • file-crawler
    • reccon
    • this-file-hides-something
    • wifiland
    • old-tickets
    • inodat
    • pattern
    • ultra-crawl
  • eJPT
Powered by GitBook
On this page
  1. CyberEDU Writeups

reccon

Previousfile-crawlerNextthis-file-hides-something

Last updated 1 year ago

Description

I heard you like memes, so we had a surprise for you. Enjoy !!

Flag format: CTF{sha256}


The challenge name is reccon, so let's get some info about this website. Since we have nothing on this page I start with fuzzing.

I found the index.php and a login page, but when I try to access the login page, nothing happens. So let's continue with fuzzing. I try to see if it is a GET parameterwith ffuf.

I want to get better at Python, so I wrote a code to find the correct parameter.

import requests
import sys
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)


# See the response in burpsuite for debuging
proxy = {"https":"https://127.0.0.1:8080","http":"http://127.0.0.1:8080"}

# list of parameters that I found using fuff 
lista=['a','c','e','g','i','k','m','o','q','s','u','w','y']
    

######### Main Function #########
def main():
    try:
        url = sys.argv[1]
    except IndexError:
        print("{+} Usage %s <url>"%sys.argv[0])
        print("{+} Usage %s www.example.com"%sys.argv[0])
    for i in lista:
        # make a payload
        payload = 'login?%s=falg'%i
        # send request using requests module
        response = requests.get(url+payload,verify=False,proxies=proxy)
        response_content = response.text 
        # verify the content
        if 'CTF' in response_content:
            print("{+} You will find the flag at %s"%sys.argv[1]+'login?%s=flag'%i)
    

if __name__=="__main__":
     main()
      

Flag

curl http://35.198.135.192:30224/index.php?m=flag -s | grep -E CTF{.*?} --color=none