当前位置:网站首页>A mining of edu certificate station

A mining of edu certificate station

2022-07-05 10:50:00 Hetian network security laboratory

Preface

lately edusrc New certificate , This cannot be arranged for him .

Set goals

Information collection without words , Open it directly fofa, Use the syntax title="XXX university ", Found a system

 once edu Excavation of certificate station 76.png

See the login box , Maybe everyone will blow up the weak password first , Maybe my face is black , I have never been able to burst out in this way , So I prefer to test unauthorized access , Here I casually input an account number and password

 once edu Excavation of certificate station 152.png

Return to grab the return package of this interface , Back in the bag 500

 once edu Excavation of certificate station 178.png

Here I change it to 200 , Can enter the system , But there is no data information

 once edu Excavation of certificate station 209.png

And then I just F12 View the source code , Found a route ,/EmployeeManager, Splice it behind the website

visit

 once edu Excavation of certificate station 263.png

 

【---- Help network security learn , All the following learning materials are free ! Add vx:yj009991, remarks “ Blog Garden ” obtain !】

 ① Thinking map of the growth path of Network Security Learning
 ② 60+ Network security classic common toolkit
 ③ 100+SRC Vulnerability analysis report
 ④ 150+ Network security attack and defense technology ebook
 ⑤ The most authoritative CISSP Certification test guide + Question bank
 ⑥ super 1800 page CTF Practical skills manual
 ⑦ A collection of the latest interview questions from Wangan factory ( With answers )
 ⑧ APP Client security detection guide ( Android +IOS)

 

Direct unauthorized access , Moderately dangerous , I originally wanted to submit it manually , But look at the certificate exchange conditions , Get two medium risks , It's not to embarrass me , There is no way to continue working overtime , So I used the user name and password I just got to log in

 once edu Excavation of certificate station 349.png

There is a personal commitment after logging in , You need to agree to the next step , Click OK to capture the package

 once edu Excavation of certificate station 387.png

 once edu Excavation of certificate station 389.png

 

Interface returns the user's sf Certificate and password , And then EmployeeID=000005  Change to 000006

 once edu Excavation of certificate station 437.png

 once edu Excavation of certificate station 439.png

 

Another level of ultra vires , Leaked user sensitive information , Moderate risk should be stable , Then I noticed that this system distinguishes between the administrator and the ordinary user , A front-end can choose the role type to log in , Then I thought about whether I could log in with the account and password of ordinary users , Then exceed the authority of the administrator , Capture packets when logging in

 once edu Excavation of certificate station 555.png

Intercept the return packets of this interface

 once edu Excavation of certificate station 568.png

hold QX Change to administrator , And then put the bag

 once edu Excavation of certificate station 584.png

You can see that you have overstepped your authority and become an administrator sf

 

end

Are very conventional loopholes , The most important thing is to be careful .

  More range experiments 、 Network security learning materials , Please click here >>

 

 

原网站

版权声明
本文为[Hetian network security laboratory]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/186/202207051035388724.html