diff options
Diffstat (limited to 'Cookie tampering/Resources')
| -rwxr-xr-x | Cookie tampering/Resources/banner_grabbing.bash | 2 | ||||
| -rw-r--r-- | Cookie tampering/Resources/notes.md | 8 |
2 files changed, 5 insertions, 5 deletions
diff --git a/Cookie tampering/Resources/banner_grabbing.bash b/Cookie tampering/Resources/banner_grabbing.bash index e17a0b2..043b56f 100755 --- a/Cookie tampering/Resources/banner_grabbing.bash +++ b/Cookie tampering/Resources/banner_grabbing.bash @@ -1,3 +1,3 @@ #!/usr/bin/bash -printf 'HEAD / HTTP/1.0\r\n\r\n' | nc 10.0.2.15 80 +curl --head http://10.0.2.15 diff --git a/Cookie tampering/Resources/notes.md b/Cookie tampering/Resources/notes.md index b372042..60ca4a6 100644 --- a/Cookie tampering/Resources/notes.md +++ b/Cookie tampering/Resources/notes.md @@ -2,14 +2,14 @@ 1. Did [banner grabbing](https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/01-Information_Gathering/02-Fingerprint_Web_Server) and noticed an interesting cookie name: ```bash - ❯ printf 'HEAD / HTTP/1.0\r\n\r\n' | nc 10.0.2.15 80 + ❯ curl --head http://10.0.2.15 HTTP/1.1 200 OK Server: nginx/1.4.6 (Ubuntu) - Date: Fri, 27 Mar 2026 09:43:20 GMT + Date: Fri, 27 Mar 2026 10:31:26 GMT Content-Type: text/html - Connection: close + Connection: keep-alive X-Powered-By: PHP/5.5.9-1ubuntu4.29 - Set-Cookie: I_am_admin=68934a3e9455fa72420237eb05902327; expires=Fri, 27-Mar-2026 10:43:20 GMT; Max-Age=3600 + Set-Cookie: I_am_admin=68934a3e9455fa72420237eb05902327; expires=Fri, 27-Mar-2026 11:31:26 GMT; Max-Age=3600 ``` 1. Reverse looked up the md5 value `68934a3e9455fa72420237eb05902327` → `false` 1. Intuited to send a request to the website with the cookie value set to the md5 hash value `true` to get the flag. Test it with `cookie_poison.bash` or directly in Firefox: **F12** → **Storage** → **Cookies**. |
