This blog will teach you how content security policies work and prevent attacks such as XSS, clickjacking. We will also cover some scenarios with CSP misconfigurations to understand how an attacker can leverage it to his own benefit and ways to prevent that. After reading this blog, you should get a better understanding of how CSP works and you will be able to analyze CSP headers and detect misconfigurations in the wild.
This box is created by polarbearer. It takes us through exploiting a deserialization vulnerability in “Ruby on Rails” to achieve remote code execution as a regular user and running commands as root through cracking a disclosed user hash from an SQL file and using Google Authenticator to get through the 2FA verification in the Linux box.
This article will cover the mechanisms of Base64 encoding. If you’re into cybersecurity or programming then you might have come across Base64. These days it’s used in a huge number of applications for easy data transmission, encoding, etc. We see a bunch of random letters with equals sign at the end and the next moment we try to decode it. Ever thought how those bunch of letters store data?
This box is created by Shaun Whorton aka egotisticalSW. This box takes us through discovering a chat web application and exploiting a server-side template injection vulnerability in it to achieve code execution and receiving a stable shell to do further privilege escalation by reading logs and exploiting an instance of Splunk Universal Forwarder to gain root!
Worker is a Windows box created by ekenas. It takes us through gaining access to Azure DevOps service from hardcoded credentials in a Subversion repository which is an open source version control system and using those credentials to login and uploading a shell to the present repositories to gain low privileged access and further getting user system login credentials from a file in the machine, to get root flag we have to use Azure Pipelines to execute Powershell commands.