Infosec Institute CTF2 Practical Web Hacking Level 11
July
17th,
2015
Vulnerability Bypassing blacklists
Description:
Write-up
For almost all levels I will be using Burpsuite. Burpsuite is an interception proxy that lets us modify the HTTP request
/ response by intercepting the data between the browser and the web server.
Blacklisting could be done by many variables, like IP address, User-Agent, Referer or a session token. So let’s see our
request in Burp and possibly start playing with some values.
GET/ctf2/exercises/ex11.phpHTTP/1.1Host:ctf.infosecinstitute.comUser-Agent:Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.6.0Accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language:en-US,en;q=0.5Accept-Encoding:gzip, deflateCookie:welcome=no; PHPSESSID=gdc668pjmpah42hegt7sa7igc3Connection:keep-alive
Aha! No need to play the guessing game with the values, right away we see Cookie name “welcome” with value of “no”.
Let’s modify “no” to “yes” and resume our request.