Advanced Web Hacking Question Paper
Advanced Web Hacking Question Paper
Advanced Web Hacking Question Paper
Question
Paper
NSS Training – AWH Question Paper
Contents
Module: Attacking Authentication and SSO ....................................................................... 4
Boundary Condition....................................................................................................... 4
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
Page | 2
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
Page | 3
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Login to the “topup” application using your registered account to generate the
access token.
• Brute-force the secret key for the JWT.
• Generate a valid token for user “[email protected]” and access all the
order details.
Page | 4
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Bypass host header validation to perform header poisoning for your account.
• Capture the password reset token.
• Change the password of the account using the captured token.
• Escalate privilege from a “bronze” user to a “gold” user through profile update to
avail additional discount.
Page | 5
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Brute-force and identify valid secret promo codes to get maximum discount on
recharge (greater than 50%).
• Create a new user (userX) with “admin” role in the CouchDB instance.
• Identify and exploit XXE to extract the contents of the file “/etc/passwd”.
• Identify and exploit blind XXE over OOB channels on the API v2 to extract the
contents of the file “/etc/passwd” from the host.
Page | 6
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Exploit SAML XML to perform XXE attack and extract the contents of the file
“c:/windows/win.ini” from the host.
• Upload a file having “docx” type to perform an XXE attack and extract the contents of
the file “/etc/passwd” from the host.
Page | 7
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Access the file where id=0 which can only be accessible by an admin.
• Buy a topup at less than total payable amount using your registered account.
• Exploit a PHP object injection instance to access “/etc/passwd” file from the server.
Page | 8
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Identify and inject a payload into the serialised data to make the host send DNS
requests to an external host.
• Get a reverse shell and extract the system information such as usernames, OS type
from the server and also read “/etc/passwd” file.
• Identify and inject a payload into the serialised data to make the host send DNS
requests to an external host.
• Get a reverse shell and extract the system information such as usernames, OS type
from the server and also read “/etc/passwd” file.
• Identify the request to inject XML serialised data and inject a payload into it to make
the host send ping requests to an external host.
Page | 9
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Get a reverse shell and extract the system information such as username, OS type
from the server and also read “/etc/passwd” file.
• Get a reverse shell and extract the system information such as username, OS type
from the server and also read “/etc/passwd” file.
• Identify and exploit the .Net Deserialization vulnerability to make the host send HTTP
requests to an external host.
• Get a reverse shell and extract the system information such as username, OS type
from the server and read “win.ini” file.
• Identify and exploit the Python Deserialization vulnerability to make the host send
DNS requests to an external host.
• Get a reverse shell and extract the system information such as username, OS type
from the server and read “/etc/passwd” file.
Page | 10
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Identify the template engine and exploit it to extract the content of the file
“/etc/passwd”
• Continue with previous exercise to obtain a reverse shell on the DB host using
Metasploit and native Windows tools (powershell, certutil, cscript etc.).
Page | 11
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Identify and exploit second order SQL Injection point in Joomla Instance
• Fetch the databases from database server
• Exploit the injection vulnerability to exfiltrate the output of command “ipconfig” over
DNS channel.
GraphQL Exploitation
Challenge URL: http://expense.webhacklab.com:3000/viewexpense
• Exploit SQL injection in one of the GraphQL endpoints and retrieve admin credentials.
• Use Introspection to extract the PII (Salary) of the ‘[email protected]’.
• Using GraphQL mutation, view expenses of all the users.
Page | 12
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Bypass the file validation checks to upload a web shell (userX.fileextension) and
execute commands on the host.
• Identify and Exploit SQL Injection via File Metadata properties to retrieve current
database user and database name.
Page | 13
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Identify and exploit SSRF vulnerability to gain access to S3 buckets and download the
source of the application hosted on AWS cloud.
• Upload a webshell via Continuous Deployment (CD) pipeline.
• Identify and exploit Remote Code Execution vulnerability in the Lambda function
• Obtain Secret Tokens
• Gain access to S3 bucket
• Connect to EC2 instance
Page | 14
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Extract the source code and achieve Remote Code Execution for the function from the
storage account of “notsosporty" using the techniques learned in this module.
• Identify AWS cognito misconfiguration and read the secrets from the secret manager.
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
• Identify whether there are any unkeyed inputs used by the application and if the server
caches the output for the same. Edit those unkeyed inputs with malicious payloads to
do the following to random user when poisoned cache is requested.
Module: Miscellaneous
Vulnerabilities
Unicode Normalization Attack
Challenge URL: http://reimbursement.webhacklab.com/Account/ResetPassword
Second-order IDOR
Challenge URL: http://reimbursement.webhacklab.com/Expense/LoadExpenseFile?id=
Page | 16
©
Claranet Cyber Security 2021. All rights reserved
NSS Training – AWH Question Paper
Page | 17
©
Claranet Cyber Security 2021. All rights reserved