Jul 01, 2024, 08:00 PM
|
HTB Blazorized - Writeup
by macavitysworld - Monday July 1, 2024 at 08:00 PM
|
|
Jul 02, 2024, 09:58 AM
Thank you @macavitysworld
Jul 02, 2024, 11:17 AM
"Deobfuscating blazor.webassembly.js reveals the path _framework/blazor.boot.json which contains metadata about the application such as DLLs"
you don't need to "deobfuscate" anything. simply proxy all the traffic through burp, browse for a little and here you have it. in the "Targets" tab you'll see _framework/blazor.boot.json. then fetch it and you have all the dlls you need.
Jul 02, 2024, 05:52 PM
(Jul 02, 2024, 11:17 AM)mazafaka555 Wrote: "Deobfuscating blazor.webassembly.js reveals the path _framework/blazor.boot.json which contains metadata about the application such as DLLs" Yeah you could do that!
Jul 03, 2024, 10:07 AM
are you kidding me
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Jul 06, 2024, 12:37 PM
(This post was last modified: Jul 06, 2024, 12:42 PM by fakerbdayX.)
In 0x2 how do I download the dlls ?
Also how do you conclude it's a jwt and you find the needed format? (Jul 06, 2024, 12:37 PM)fakerbdayX Wrote: In 0x2 how do I download the dlls ? Check the history in burp/zap or any other interception proxy or developer tools. Moreover the json gives a more information and at the bottom you'll see a helper.dll. You can easily access them via url. https://ibb.co/KzCT8LX Then you can analyze the dll with dnspy: https://github.com/dnSpy/dnSpy/releases or any other dll-decompiler. In the helper.dll you'll find the functions and all other informations. https://ibb.co/rHSDSXg In the other thread somebody postest already a script to generate a valid token: import jwt
Jul 06, 2024, 04:02 PM
(This post was last modified: Jul 06, 2024, 04:03 PM by macavitysworld.)
(Jul 06, 2024, 12:37 PM)fakerbdayX Wrote: In 0x2 how do I download the dlls ? Good question, I think you like copy pasting, without even investigating. But, I'll explain; If you deobfuscate `blazor.webassembly.js` you can find the path `_framework/blazor.boot.json` which contains metadata of the application including th DLL's that need to be loaded, entrypoints and other configurations. You can also find it via burp, which ever feels comfortable. Once you have the url's of the DLL's you can download it via your browser, just visit the url. And if you decompile `Blazorized.Helpers` you can find `GenerateSuperAdminJWT` method which generates jwt with specific format. |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,191 |
2 hours ago Last Post: kkkato |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,495 |
Yesterday, 11:06 PM Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 398 |
Yesterday, 10:36 PM Last Post: op334 |
|
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 369 | 92,019 |
Yesterday, 04:10 PM Last Post: sabbyahmed |
||
| CBBH Write Ups | 22 | 6,229 |
Yesterday, 06:39 AM Last Post: Usercomplex |
||