Skip to content

In this Capture The Flag (CTF) challenge, I navigated through a web application named 'Rekall,' leveraging my knowledge of various web application vulnerabilities to uncover 15 hidden flags. Each flag represented a unique security flaw, exposing weaknesses

Lodoelama/Web-Application-CTF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 

Repository files navigation

CTF Challenge: 'Rekall Web Application CTF'

HTML PHP JavaScript Burp Suite

Objective

Embarked on a Capture The Flag (CTF) challenge to exploit multiple vulnerabilities in the 'Rekall' web application to capture 15 flags. Each flag represented a common vulnerability found in insecure web applications.

Preparation

After logging into Kali and navigating to the correct directory, started the Docker container that held the 'Rekall' web application. Accessed the application at http://192.168.14.35 and clicked "Get Started".

Flags

Flag 1: Reflected XSS on 'Welcome' Page

On the 'Welcome' page, a reflected Cross-Site Scripting (XSS) vulnerability was identified by inputting <script>alert('XSS');</script> in the 'Put Your Name Here' field, which triggered an alert pop-up. This vulnerability is a type of XSS, where malicious scripts are injected into otherwise benign and trusted websites.

Flag 1

Flag 2: XSS Payload in 'Choose Your Character' Field

On the 'Memory-Planner' page, a Cross-Site Scripting vulnerability was identified. By bypassing input validation with the payload <SCRscriptIPT>alert(“Hello”);</SCRscriptIPT>, the second flag was revealed.

Flag 2 - Image 1 Flag 2 - Image 2

Flag 3: Stored XSS on 'Comments' Page

The 'Comments' page had a stored XSS vulnerability. By using the payload <dummy<dummy<script>alert('Hello');</dummy</script></dummy>, the third flag was revealed.

Flag 3

Flag 4: Sensitive Data Exposure in 'About Rekall' Response Header

Sensitive information was found in the HTTP response headers of the 'About Rekall' page, leading to the discovery of the fourth flag.

Flag 4

Flag 5: Local File Inclusion on 'Memory-Planner' Page

The 'Memory-Planner' page contained a Local File Inclusion (LFI) vulnerability. By uploading a .php file, the fifth flag was obtained.

Flag 5

Flag 6: LFI Exploit with File Name Manipulation

Exploiting the LFI vulnerability on the 'Memory-Planner' page, the sixth flag was discovered by renaming a .jpg file to .php and uploading it.

Flag 6

Flag 7: SQL Injection on 'Login' Page

A SQL Injection (SQLi) vulnerability was found on the 'Login' page. Exploiting this vulnerability using the username obtained from a directory traversal attack revealed the seventh flag.

Flag 7 - Image 1 Flag 7 - Image 2

Flag 8: Sensitive Data Exposure on 'Login' Page

The eighth flag was discovered within the HTML source code of the 'Login' page, where the login credentials were mistakenly exposed.

Flag 8

Flag 9: Sensitive Data Exposure via 'Robots.txt'

By accessing the 'robots.txt' file, sensitive data was uncovered, leading to the capture of the ninth flag.

Flag 9

Flag 10: Command Injection on 'Networking' Page

Exploiting a command injection vulnerability on the 'Networking' page using the payload www.example.com; cat vendors.txt, the tenth flag was revealed.

Flag 10

Flag 11: Advanced Command Injection on 'Networking' Page

Using an advanced command injection payload www.example.com | cat vendors.txt on the 'Networking' page, the eleventh flag was secured.

Flag 11

Flag 12: Brute Force Attack on 'Login' Page

A brute force attack was performed on the 'Login' page using simple password payloads in burp intruder and found the password for melina:melina ,uncovering the twelfth flag.

Flag 12

Flag 13: PHP Injection on 'Souvenirs' Page

Exploiting a PHP injection vulnerability on the 'Souvenirs' page using the payload ;system(‘cat/etc/passwd’) revealed the thirteenth flag.

Flag 13

Flag 14: Session Management Vulnerability on 'admin_legal_data.php' Page

Exploiting a session management vulnerability on the 'admin_legal_data.php' page using the Burp Intruder tool to brute force session IDs, the fourteenth flag was captured.

Flag 14

Flag 15: Directory Traversal on 'disclaimer.php' Page

The fifteenth flag was achieved by exploiting a directory traversal vulnerability on the 'disclaimer.php' page. Navigating the contents of the directory due to a common injection exploit led to the exposure of the fifteenth and final flag.

Flag 15

Conclusion

This challenge has reinforced my understanding of various web application vulnerabilities and how they can be exploited in a real-world scenario. Through persistence, I was able to successfully capture all 15 flags and complete the CTF challenge. I'm eager to apply my expanded knowledge to future cybersecurity endeavors.

About

In this Capture The Flag (CTF) challenge, I navigated through a web application named 'Rekall,' leveraging my knowledge of various web application vulnerabilities to uncover 15 hidden flags. Each flag represented a unique security flaw, exposing weaknesses

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published