HTB - 0xBOverchunked [WEB]
by LOOOP - Saturday February 3, 2024 at 01:03 PM
#1
Hey, BF new challenge is here

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Compromised - Malware Logs
Reply
#2
Link - https://app.hackthebox.com/challenges/0xboverchunked
Reply
#3
Working on it, I figured out you can bypass the waf.php filter to circumvent "OR" by doing "o+r" .
the flag is obivously at id=6 from reading the code which is blocked

it doesn't see 5 + 1 as 6 though, just an invalid ID
Reply
#4
It can be done with a very well formulated sqlmap query as well. Just don't forget about the flags, level, risk, random agent, etc.

And think about which endpoint, what you want to search for, and dump that shit.

It's going to find some injection parameter that can be abused of course...
Reply
#5
I read all the code but i couldn't bypass waf ! tried also with sqlmap -r req{http post request `Controllers/Handlers/SearchHandler.php`} with --level 5 --risk 3 --dump
Reply
#6
sqlmap is unintended afaik
HackTheBox - 99% Done - Get any flags or pwn you need
https://xan6.mysellix.io/
Reply
#7
6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -

I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...
Reply
#8
(Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -

I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...

how could you dump anything with the request that contains quote? 
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '
Reply
#9
(Feb 08, 2024, 06:54 PM)Steward Wrote:
(Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -

I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...

how could you dump anything with the request that contains quote? 
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '

Transfer-Encoding: chunked
Reply
#10
(Feb 09, 2024, 05:17 PM)dhzzz Wrote:
(Feb 08, 2024, 06:54 PM)Steward Wrote:
(Feb 07, 2024, 04:10 PM)dhzzz Wrote: 6' AND CASE WHEN gamedesc LIKE 'HTB{%}' THEN 1 ELSE load_extension(1) END -- -

I dumped the flag with this sqli but its not case sensitive, REGEXP and COLLATE doens't seems to work...

how could you dump anything with the request that contains quote? 
you should get response "SQL Injection attempt identified and prevented by WAF!" because your request contains '

Transfer-Encoding: chunked


It's giving me internal server error. Any idea?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,899 2 hours ago
Last Post: VictorPipeau
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 601 91,509 2 hours ago
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,787 3 hours ago
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,599 7 hours ago
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,242 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)