Summary

  • The writer succeeded in hacking a server without using any exploits by exploiting a timing difference they noticed which hinted at an authentication problem.
  • The writer proceeded to use a tool for brute forcing authentication without being detected through a basic username and password login.
  • After an in-depth analysis of the web app, they used a word list tailored to the potential username to guess the password and figured out how to bypass the CAPTCHA since it did not reset the login session, allowing them to guess the password without typing it in.
  • Finally, they managed to get the admin flag without doing any coding after only 12 attempts, lifting the limit set by the CAPTCHA and avoiding the risk of getting locked out.
  • The author concludes this interesting report by specifying the particularities of the lab environment, objectively outlining the steps and explaining their thought process in detail, enabling readers to replicate their success. Cmdlets and screenshots are also provided, enriching the content of this report.

By phoenixcatalan

Original Article