Modern Web Exploitation Techniques
Skills Assessment
Scenario
Inlanefreight, our valued client, has contacted us to conduct an external penetration test against some of their web applications. However, this is not just any ordinary penetration test because they are on the brink of launching a groundbreaking PDF creator.
Inlanefreight has provided us with a list of subdomains and their corresponding local port numbers where the web applications live, all within the defined scope of this penetration test. Any targets beyond the boundaries of this explicitly mentioned list are strictly off-limits and fall outside the scope of our assessment.
In-Scope Subdomains
| Target | Local Port |
|---|---|
library.inlanefreight.local |
8001 |
vault.inlanefreight.local |
8002 |
pdf.inlanefreight.local |
8003 |
webmin.inlanefreight.local |
10000 |
To add these subdomains to your /etc/hosts file, use the command below, replacing <Target_IP> with the spawned target's IP address:
[!bash!]$ sudo tee -a /etc/hosts > /dev/null <<EOT
## inlanefreight hosts
<Target_IP> library.inlanefreight.local vault.inlanefreight.local webmin.inlanefreight.local pdf.inlanefreight.local
EOT
Harness the modern web exploitation techniques you learned in this module to disclose all of Inlanefreight's security vulnerabilities.
VPN Servers
Warning: Each time you "Switch", your connection keys are regenerated and you must re-download your VPN connection file.
All VM instances associated with the old VPN Server will be terminated when switching to
a new VPN server.
Existing PwnBox instances will automatically switch to the new VPN server.
PROTOCOL
/ 1 spawns left
Questions
Answer the question(s) below to complete this Section and earn cubes!
Click here to spawn the target system!
Target:
Click here to spawn the target system!
+10 Streak pts
+10 Streak pts
+10 Streak pts
+10 Streak pts
Table of Contents
Introduction to Modern Web Exploitation Techniques
Introduction to Modern Web Exploitation TechniquesDNS Rebinding
Introduction to DNS Rebinding SSRF Basic Filter Bypasses DNS Rebinding: SSRF Filter Bypass DNS Rebinding: Same-Origin Policy Bypass DNS Rebinding: Tools & PreventionSecond-Order Attacks
Introduction to Second-Order Attacks Second-Order IDOR (Whitebox) Second-Order IDOR (Blackbox) Second-Order LFI Second-Order Command InjectionWebSocket Attacks
Introduction to WebSockets WebSocket Analysis in Burp Exploiting XSS via WebSockets Exploiting SQLi via WebSockets Cross-Site WebSocket Hijacking (CSWH) WebSocket Attacks: Tools & PreventionSkills Assessment
Skills AssessmentMy Workstation
OFFLINE
/ 1 spawns left