🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Briefing L03 C03
  • Off Balance
  • Flag Capture
  • Scoreboard
  1. WiCYS CyberStart
  2. Chapter 3 - Barcelona In the thick of it

WiCYS Cyberstart (Barcelona) Challenge 3

Curling your way to find some hidden content...

PreviousWiCYS CyberStart (Barcelona) Challenge 2NextWiCYS CyberStart (Barcelona) Challenge 4

Last updated 3 years ago

Briefing L03 C03

Off Balance

We’re hot on the heels of catching this cyber gang but the closer we get the more damage they try to inflict onto the Barcelona tourism industry! This time, they’ve hacked into a large international bank’s mobile application. Customers of the bank are complaining they can’t see their current balance. Intern, help customers retrieve their balances so they can continue to spend their money during their well-earned holidays!

Tip: Bypass the calculator lock to get the flag.

We can find this banking app —with sections for Recent Transactions, Payments, and Account Balances. The third section of the app is where we have a problem.

So our objective is to find the contents of the Balances page

How do we go about that?

Open the source code and head over to the 'Network' section, where we find the following web paths.

As seen in the picture /get-balances path is currently facing a 404 error and is unreachable. The rest are perfectly fine.

Extend ‘/get-balances to get more information about the path

To test the connection, let's cURL the connection to /get-transactions. Use your Kali’s CLI interface for this

Command - curl -s https://cloudninebank.com/get-transactions

A token is required as additional data to the URL. This can be found in the Payload section of the Inspect Element. Let’s now test a working web path.I chose /get-payments

Adding it to our curl command, we get:-

curl -d “CNcsmXX5d50ZQCG5Us4twDi18awV” -s https://cloudninebank.com/get-balances

Now, let's proceed to test /get-balances

What we get is a “Resource not found” reply.

See, the stark difference

Flag Capture

Seeing no other tweaks to make, now let’s curl the main website

curl -d “token=CNcsmXX5d50ZQCG5Us4twDi18awV” -s https://cloudninebank.com

Hey, hey what do we notice here? Instead of get-balances entry, we find a path get-accounts. Let’s curl that instead, using the token value

As you notice, the flag is present towards the bottom

Flag — postD4ta_w1zard

Submit it and onward ahoy to the next challenge.

Scoreboard

💒