Home
Publications
Talks
Certifications
Media
Services
Contact
Blog
Light
Dark
Automatic
Web Applications Hacking
KringleCon | HR Incident Response | CTF Challenge Solution
Question 7 HR Incident Response In this challenge, we are given a website with CSV upload capability and are asked to somehow gather information from the contents of the file: C:\candidate_evaluation.
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
capture the flag
KringleCon | Badge Manipulation Question 6 | CTF Challenge Solution
Question 6: Badge Manipulation The objective for this challenge is simple – we need to bypass the authentication mechanism. The way the authentication works is the machine “Scanomatic” scan a QR code on an employee badge and grants access depending if the QR code matches a proper record in the back-end database.
Pranshu Bajpai
Last updated on Sep 17, 2023
3 min read
capture the flag
KringleCon | CURLing Master & AD Privilege Discovery | CTF Challenge Solution
Holly Evergreen: CURLing Master We know that the candy striper machine can be turned on by sending a request to port 8080 on localhost (127.0.0.1). But we do not know what request to send.
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
capture the flag
KringleCon | Tangle Coalbox & de Bruijn Sequences | CTF Solution
Tangle Coalbox: Lethal ForensicELFication The poem that introduces the challenge talks about certain “text editors” leaving behind clues. Vim immediately comes to mind. We know that Vim logs information about deletions and searchers into a file called .
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
capture the flag
Local PHP File Inclusion Vulnerability Example | Web Applications Hacking | How To | LFI PHP
The vulnerability lies in how web pages are invoked on a web server. If an absolute path or direct referencing is used then it is possible to invoke pages on the server that a hacker has no business seeing.
Pranshu Bajpai
Last updated on Sep 17, 2023
1 min read
penetration testing
How To Test Cookie / Session ID Randomness Using Burp Suite Sequencer
When you log on to a web server, a session is created which is identified by a session ID. The session identifier can be a cookie. This cookie holds the session ID so that one can log in once for each session (From there on, the session is then passed on to various web pages one browses on that server).
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
penetration testing
Fuzz Testing Web Applications With Burp Suite | Burp Intruder [Sniper] to Fuzz Parameters
IronGeek hosts a lot of good videos about testing web applications with Burp Suite. I tested these attacks out myself. Attacked Server: Mutillidae Test Page: Main Login Form Test Parameter: Username
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
penetration testing
Directory Browsing Vulnerability | Directory Listing / Traversal Attack | How To | Demo [Screenshots] | Mutillidae
As a web application penetration tester, when you find directory browsing enabled on a web server, you include it in your report, but you know subsequent exploitation might be a long shot depending on what information is actually exposed.
Pranshu Bajpai
Last updated on Sep 17, 2023
1 min read
penetration testing
Web Applications Authentication Brute Force | Practical Demo [Screenshots] | Brute Force Website Login | How To
This post is meant to elucidate web application brute forcing by providing a practical demo. Read up on Authentication Brute Force here. OWASP testing guide is your friend in Web Application Hacking.
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
penetration testing
Command Injection Attack Example | Web Applications Hacking | Using Kali Linux
Read up on command injection here. OWASP testing guide is your best friend while learning web applications hacking or penetration testing. I tested the attack on two different vulnerable applications, one of which is Mutillidae.
Pranshu Bajpai
Last updated on Sep 17, 2023
2 min read
penetration testing
Cite
×