Today we take another adventure into Post Swigger's Web Security Academy and their process.
The nice thing about this is that it feels more practical. There are no "flags" like traditional CTFs. This is all focused on practical outcomes and actual issues.
The annoying thing is that it gives no hints as to how to start and no hints if you get stuck. There is a solution part that I have yet to look at this while writing it so I cannot say how it is.
- CTF Name: Validation of CSRF token depends on request method
- Resource: Port Swigger Academy
- Difficulty: Easy
- Number of Flags: 1
- Hint: This lab's email change functionality is vulnerable to CSRF. It attempts to block CSRF attacks, but only applies defenses to certain types of requests.
- Acquired By: To change the users email address simply log in with the creds that were given (carlos/ montoya). (The first bit is the same as previous but this is practice so here we go.)
- Once logged in, navigate to the "change email" tab
- Now lets see what it happen in the page source and the network. There isn't much going on here. The only thing being sent in the network body is the form data with an email address that will be changed. It is a "POST" method and there is a cookie in the Request header. (You can also see this in BurpSuite but the network tab is just as easy and no proxy needed.)
- Now jump over to the "exploit server" at the top of the page and craft the body of the exploit. Below you can see that I took the code they had in the main info part and changed it a bit for my instance.
- Now save it via the "store" button as this will automatically launch it and you pass the lab.
- Thoughts:This took me a minute to wrap my head around what exactly they were wanting. For this lab you need to be in their environment and there is really only one way to solve it. Utilize their "exploit server" with the correct body. I originally was trying to run this exploit by crafting a .html page myself but that wasn't working. So far it seems that they want you to use their exploit server system to solve the task but it still shows a practical use of the process.
CSRFs can not look like much but can be very costly if executable. When successful a CSRF attack causes the victim to carry out an action unintentionally and depending on the nature of the action, the attacker might be able to gain full control over the user's account.
A common practice to avoiding this attack is by having a CSRF Token.
But, be careful not to expose this token as that can help the attack.
How to become a Frontend Dev 👩💻👨💻 +the Frontend checklist✅
Desiré 👩🎓👩🏫 -
Top Data Structures and Algorithms every developer must know
Amanda Fawcett -
20 Awe-Inspiring Codepen Examples You Can Learn From
Frontend Dude 👨💻 -
Setting Heroku Config Vars with Google Cloud JSON Credentials File and Rails
Sylvia Pap -