• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

TryHackMe: OWASP Top 10 Challenge [Phần 3]

AnonyViet by AnonyViet
January 25, 2023
in Security
0

Continuing with part 2, in this article I will guide you to exploit OWASP vulnerabilities such as Insecure Deserialization, Components With Known Vulnerabilities, and Insufficient Logging & Monitoring in challenge OWASP Top 10.

Join the channel Telegram of the AnonyViet 👉 Link 👈

TryHackMe: OWASP Top 10 Challenge [Phần 3]

TryHackMe: OWASP Top 10 Challenge [Phần 3]

Mission 21: [Mức độ nghiêm trọng 8] Insecure Deserialization

What applications are vulnerable?

Any application that stores or fetches data for which no authentication or integrity check is applied to the queried or stored data. Some examples of applications of this nature are:

  • E-commerce website
  • Forum
  • API
  • Runtimes applications (Tomcat, Jenkins, Jboss, …)

You can learn more about Insecure Deserialization here.

#1 Who developed the Tomcat application?

TryHackMe: OWASP Top 10 Challenge [Phần 3] 25

Answer: Apache Software Foundation

#2 What kind of attacks that crash services can be done with insecure decryption?

This definition is still quite broad. But can be understood like this, unsafe decryption is replacing the data processed by the application with malicious code; allows anything from DoS (Denial of Service) to RCE (Remote Malware Execution) that an attacker can use to gain a foothold in pentesting.

Answer: Denial of Service

Mission 22 [Mức độ nghiêm trọng 8] Unsecure Decryption – Object

#1 Choose the correct term of the following sentence:

if a dog was sleeping, would this be:

A) A State
B) A Behaviour

Answer: A Behaviour

Mission 23: [Mức độ nghiêm trọng 8] Insecure Deserialization — Deserialization

Suppose you have a password “password123” from a program that needs to be stored in a database on another system. To move across a network, this string/output needs to be converted to binary. Of course, the password needs to be stored as “password123” and not its binary string. When it reaches the database, it will be converted or deserialised back to “password123” to be stored.

#1 What is the name of the base 2 format in which data is sent over the network?

Answer: binary

Mission 24 [Mức độ nghiêm trọng 8] Insecure Deserialization — Cookies

#1 If the cookie has a path of webapp.com/login, what is the URL the user has to visit?

Answer: webapp.com/login

#2 What is the acronym for the web technology that Secure cookies work on?

Answer: Https

Mission 25: [Mức độ nghiêm trọng 8] Insecure Deserialization — Cookies Practical

I will log in to a website like the one below.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 26

Create an account. No need to enter details, you can enter what you like.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 27

Notice on the right, you have your details.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 28

Right click on the page and hit “Inspect Element” then go to the “Storage” tab.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 29

Check Encrypted Data

You will see here that there are both plaintext and base64 encoded cookies. The first flag will be found in one of these cookies.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 30

Answer: THM{good_old_base64_huh}

Modify cookie value

Notice here that you have a cookie named “userType”. You are now a user, as confirmed by your information on the “myprofile” page.

This application defines what you can and cannot see by your userType. What if you want to be an administrator?

Double left click on the “Value” column of “userType” to modify the content. Let’s change our userType to “admin” and navigate to http://10.10.83.1/admin to get the second flag.

TryHackMe: OWASP Top 10 Challenge [Phần 3] thirty first

TryHackMe: OWASP Top 10 Challenge [Phần 3] 32

Answer: THM{heres_the_admin_flag}

Mission 26: [Mức độ nghiêm trọng 8] Insecure Deserialization — Code Execution

1. First, change the value of the userType cookie from “admin” to “user” and back to http://10.10.83.1/myprofile.

2. Then left click on the URL under “Exhange your vim” in the screenshot below.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 33

3. Next left click on the URL under “Provide your feedback!” to a page like this:

TryHackMe: OWASP Top 10 Challenge [Phần 3] 34

#1 flag.txt

Change netcat ip.

Use command nano rce.py

Swap tryhackmyIP to the IP of that website.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 35 TryHackMe: OWASP Top 10 Challenge [Phần 3] 36

Paste this into the “encodedPayload” cookie in your browser:

TryHackMe: OWASP Top 10 Challenge [Phần 3] 37

7. Make sure netcat is still running:

TryHackMe: OWASP Top 10 Challenge [Phần 3] 38

8. Refresh the page. It will hang, go back to netcat:

TryHackMe: OWASP Top 10 Challenge [Phần 3] 39

Answer: 4a69a7ff9fd68

Mission 29: [Mức độ nghiêm trọng 9] Components With Known Vulnerabilities — Lab

#1 How many characters are in /etc/passwd (using WC -c /etc/passwd for the answer)

Visit the website, as we see this is a normal book website.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 40

Did a bit of research on vulnerabilities found in online bookstore sites and I found this.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 41

TryHackMe: OWASP Top 10 Challenge [Phần 3] 42

TryHackMe: OWASP Top 10 Challenge [Phần 3] 43

Answer: 1611

Mission 30: [Mức độ nghiêm trọng 10] Insufficient Logging & Monitoring

TryHackMe: OWASP Top 10 Challenge [Phần 3] 44

We have to download the login-logs.txt file. Click download and save the file.

#1 What IP address is the attacker using?

We can use cat login-logs.txt and see all the frontends.

TryHackMe: OWASP Top 10 Challenge [Phần 3] 45

There is one person constantly accessing the system with different usernames.

Answer: 49.99.13.16

#2 What kind of attack is being performed?

HTTP 401 indicates that the request has not been applied because it lacks valid credentials for the target resource.

So I think it’s a brute force attack because we see that someone is repeatedly trying a password with a different username.

Answer: Brute Force

So this series is done. Are you looking forward to other series? In addition, you can also see more challenges on tryhackme here.

The article achieved: 5/5 – (100 votes)

Tags: challengeOWASPPhầnTopTryhackme
Previous Post

Lesson 102: How to enable read-only mode not for editing in Excel

Next Post

How to Install Chrome OS Flex on PC or Mac

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to Install Chrome OS Flex on PC or Mac

How to Install Chrome OS Flex on PC or Mac

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
[Godot Shooter] #2: Creating characters & shooting bullets

[Godot Shooter] #2: Creating characters & shooting bullets

June 7, 2025
Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply