(July 17, 2022, 10:03 AM)just4htb1337 Wrote: Any chance someone could help with how to extract the base64.c00.xyz in "logs.amzcorp.local"? Tried different kind of grep, jq, even notepad++
nvm ... managed to extract them using transpose paste in excel :)
But couldn't find any flag, just the parts of passwd file and cron...
[/quote]Still works.Create an account first then use your cookie...[hr][quote="teksius" pid="155917" dateline="1658067265"][quote="just4htb1337" pid="155591" dateline="1658052220"][s]Any chance someone could help with how to extract the base64.c00.xyz in "logs.amzcorp.local"? Tried different kind of grep, jq, even notepad++[/s]nvm ... managed to extract them using transpose paste in excel :) [s]But couldn't find any flag, just the parts of passwd file and cron...[/s]nvm ... got the flag...[/quote]Learn python, man...[/quote]Yeah man ... still in the learning phase :)
(July 15, 2022, 12:19 PM)mceye Wrote: look logs for Tyler and urlencoded password. Also look for the /.git and dmp it . then see the commits and look for info and vulnerability.
aws --endpoint-url http://cloud.amzcorp.local ecs help
these creds are useless focus on custom_jwt.py and you can exploit this ecdsa library it is a crypto shit i'm stuck here if yor are good in crypto then maybe you can find flag 4
and that jwt creating here http://company-support.amzcorp.local
The custom_jwt.py is to get the flag 4 or the flag 3 ?
flag 4
flag 3 is in sql db. dump keys_tbl table
[quote pid="152349" dateline="1657901437"] Any help, with SQL injection, is it possible to use SQLMAP with some tamper, or do you play manually? [/quote]
(July 15, 2022, 12:19 PM)mceye Wrote: look logs for Tyler and urlencoded password. Also look for the /.git and dmp it . then see the commits and look for info and vulnerability.
aws --endpoint-url http://cloud.amzcorp.local ecs help
these creds are useless focus on custom_jwt.py and you can exploit this ecdsa library it is a crypto shit i'm stuck here if yor are good in crypto then maybe you can find flag 4
and that jwt creating here http://company-support.amzcorp.local
The custom_jwt.py is to get the flag 4 or the flag 3 ?
flag 4
flag 3 is in sql db. dump keys_tbl table
[quote pid="152349" dateline="1657901437"] Any help, with SQL injection, is it possible to use SQLMAP with some tamper, or do you play manually?
[/quote] sqlmap doesn't work... manual injection is the path ... there is a blacklist filter... you can simple bypass them using camel case
(July 15, 2022, 12:19 PM)mceye Wrote: look logs for Tyler and urlencoded password. Also look for the /.git and dmp it . then see the commits and look for info and vulnerability.
curl -s -X POST "http://jobs.amzcorp.local/api/v4/users/edit" --cookie "TYLER_SESSION_COOKIE" -d '{"update_user":"BASE64_MYUSER_JSON_PAYLOAD"}' --header "Content-Type: application/json" --cookie "api_token=API_TOKEN" Internal Server Error
Internal Server Error
Also tried with an invalid user to get "Unable to find user" error but did not work.--curl -s -X POST "http://jobs.amzcorp.local/api/v4/users/edit" --cookie "" --cookie "api_token=API_TOKEN" --header "Content-Type: application/json" -d '{"update_user": ""}'Even this is throwing an Internal Server Error.Do you think something is broken?Can somebody click on Reset?----UPDATE: No problem after reset.