WiCYS CyberStart (Tokyo) Challenge 4
Web Login vulnerability
Last updated
Web Login vulnerability
Last updated
A successful new start-up that sells electric scooters has discovered a handful of their customers’ accounts have been hacked! And guess who we believe might be behind it? Yep, you’ve guessed it, the Yakoottees. Having only just entered the market and keen to maintain their otherwise excellent reputation, this business needs our help to run a security audit of their login system. Can you spot any security holes?
Tip: Successfully login to get the flag.
We come across this login page, belonging to the Zip Zap Rides startup
The manual says that there is a vulnerability on this website. Let’s hunt that down!
I took three approaches to solve this, each more complex than the next one.
If you look closely, there are 4 parameters whose values we need to know. These are email, password, submittedEmail, and SubmittedPassword
Since the values were not present, I tried to manipulate the source code, inserting custom values
This did not work, as I was repeatedly changing comments one after the other, to get the login page to work
Having no email address (from the company) to use in the email field, it was worth a try to try payloads from this Github repository and spray it on the password section
That approach did not work as well
Right. This was the way out.
Since the console had come in handy in the previous challenge, let’s make use of it.
Right click ->Console
We can observe that the parameters for login were ‘email’ and ‘password’.Let’s try querying it against the console
This is what we get:-
We get what we have been looking for!
Login page credentials
Email — bonita@zip-zap-rides.com
Password — letmein
Use it to log in and we get the flag
Flag — pgHGwHToGfFE2MC4BF1A
It’s time to bid farewell to the Tokyo base (especially when it gave us our hardest challenge yet) and set base somewhere else. Let’s see where our CyberStart journey takes us.
Onward to the next challenge!