README - Web
Last updated
Last updated
Read me if you can!! NB: There is no need to do bruteforce. Target:
We get the following IP address with port:
The following page is located at the address we received:
Let's first try to read the text.txt
file by entering its name in the text box and clicking the Read
button:
The website returned a message that reading the file was possible. So let's try to do the same for the flag.txt
file:
We receive a 403 Access Denied
message. Let's move to the repeater in Burp
. The GET
query for the flag.txt
file is as follows:
The response 403 Access Denied
was returned in the JSON
format. The returned response in JSON format may indicate that we should use one of the techniques used to bypass 403 and 401 responses. Some techniques to bypass 403 and 401 responses can be found on HackTicks:
One such technique is HTTP Headers Fuzzing. We will try to add to our GET
request the following headers:
After adding the X-Forwarded-For: 127.0.0.1
header and sending the GET
query, the following flag is returned:
Flag: