Skip to content

Latest commit

 

History

History
69 lines (36 loc) · 2.14 KB

README.md

File metadata and controls

69 lines (36 loc) · 2.14 KB

Manager

Write-up author: jon-brandy

DESCRIPTION:

A client asked me to perform security assessment on this password management application. Can you help me?

HINT:

  • NONE

STEPS:

  1. After installed the apk and opened it, enter your host then intercept the request you send at the login page.

INTERCEPT USING BURP

image

REPEATER

image

  1. Let's create a user then.

CREATING USER (REGISTER)

image

image

  1. Great at the response tab we can see our role and id.
  2. This could be IDOR vuln, but there's no id parameter at the request.
  3. After logged in, we have an update feature which we can utilize to change other user password by their id, if there is id parameter when we do update request.

image

DO REQUEST - Opened manage.php - turns out there is no id param.

image

  1. Stuck for a while until i tried to register a username admin and it says username already taken.

CREDS ENUMERATION VULN

image

  1. Knowing this, let's try to change the password again but this time change the username as admin and the password as random strings.

Do login again using the account we've made before and intercept request for update account.

image

  1. Great! Now let's do login again.

RESULT

image

  1. Got the flag!

FLAG

HTB{b4d_p@ss_m4n@g3m3nT_@pp}