diff options
| author | Thomas Vanbesien <tvanbesi@proton.me> | 2026-03-27 11:33:18 +0100 |
|---|---|---|
| committer | Thomas Vanbesien <tvanbesi@proton.me> | 2026-03-27 11:33:18 +0100 |
| commit | 3b584164fba5d88866d84f1ce2bbe26e473b58b7 (patch) | |
| tree | e4cafa450395c740214ab9c4ac9b3c3ecc1e0ce8 /Cookie tampering/Resources/notes.md | |
| parent | 86693ac50c3757ea52c8cc5b4c6b5ecc606db066 (diff) | |
| download | darkly-3b584164fba5d88866d84f1ce2bbe26e473b58b7.tar.gz darkly-3b584164fba5d88866d84f1ce2bbe26e473b58b7.zip | |
Use curl instead of netcat for banner grabbing in cookie tampering solution
Diffstat (limited to 'Cookie tampering/Resources/notes.md')
| -rw-r--r-- | Cookie tampering/Resources/notes.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/Cookie tampering/Resources/notes.md b/Cookie tampering/Resources/notes.md index b372042..60ca4a6 100644 --- a/Cookie tampering/Resources/notes.md +++ b/Cookie tampering/Resources/notes.md @@ -2,14 +2,14 @@ 1. Did [banner grabbing](https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/01-Information_Gathering/02-Fingerprint_Web_Server) and noticed an interesting cookie name: ```bash - ❯ printf 'HEAD / HTTP/1.0\r\n\r\n' | nc 10.0.2.15 80 + ❯ curl --head http://10.0.2.15 HTTP/1.1 200 OK Server: nginx/1.4.6 (Ubuntu) - Date: Fri, 27 Mar 2026 09:43:20 GMT + Date: Fri, 27 Mar 2026 10:31:26 GMT Content-Type: text/html - Connection: close + Connection: keep-alive X-Powered-By: PHP/5.5.9-1ubuntu4.29 - Set-Cookie: I_am_admin=68934a3e9455fa72420237eb05902327; expires=Fri, 27-Mar-2026 10:43:20 GMT; Max-Age=3600 + Set-Cookie: I_am_admin=68934a3e9455fa72420237eb05902327; expires=Fri, 27-Mar-2026 11:31:26 GMT; Max-Age=3600 ``` 1. Reverse looked up the md5 value `68934a3e9455fa72420237eb05902327` → `false` 1. Intuited to send a request to the website with the cookie value set to the md5 hash value `true` to get the flag. Test it with `cookie_poison.bash` or directly in Firefox: **F12** → **Storage** → **Cookies**. |
