Skip to content

Commit d076a3e

Browse files
committed
SOAP added
1 parent 91efa37 commit d076a3e

File tree

8 files changed

+50
-1
lines changed

8 files changed

+50
-1
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This event writeup is a work in progress
1313
I will describe, how to solve some challenges, that are not presented in [this repo](https://github.com/snwau/picoCTF-2023-Writeup), that was original inspiration for creating my own writeup repo.
1414

1515
* Web Exploitation
16-
* SOAP
16+
* **[SOAP](Web%20Exploitation/SOAP/SOAP.md)**
1717
* **[More SQLi](Web%20Exploitation/More%20SQLi/More-SQLi.md)**
1818
* **[Java Code Analysis](Web%20Exploitation/Java%20Code%20Analysis/Java-code-analysis.md)**
1919
* Reverse Engineering

Web Exploitation/SOAP/1.jpg

96.5 KB
Loading

Web Exploitation/SOAP/2.jpg

52.8 KB
Loading

Web Exploitation/SOAP/3.jpg

24.5 KB
Loading

Web Exploitation/SOAP/4.jpg

18.3 KB
Loading

Web Exploitation/SOAP/5.jpg

45.2 KB
Loading

Web Exploitation/SOAP/6.jpg

122 KB
Loading

Web Exploitation/SOAP/SOAP.md

+49
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
# SOAP #
2+
3+
## Overview ##
4+
5+
100 points
6+
7+
Category: [Web Exploitation](../)
8+
9+
Tags : `#picoCTF 2023` `Web Exploitation` `XXE`
10+
11+
## Description ##
12+
13+
The web project was rushed and no security assessment was done. Can you read the /etc/passwd file?
14+
15+
Additional details will be available after launching your challenge instance.
16+
17+
## Solution ##
18+
19+
After start of the instance picoCTF will provide you a link to running instance.
20+
21+
There is a site.
22+
23+
![Screenshot of the main screen](1.jpg)
24+
25+
We saw tag `XXE` -> `XML external entity` and also, when we inspect static resources (F12 -> Sources in Google Chrome) of the site, we saw this two files:
26+
27+
detailsCheck.js
28+
29+
![Screenshot of the js](2.jpg)
30+
31+
xmlDetailsCheckPayload.js
32+
33+
![Screenshot of the js](3.jpg)
34+
35+
So, now we know for sure, that it is XXE.
36+
37+
Also in the index.html we saw the endpoint for the POST request:
38+
39+
![Screenshot of the index.html](4.jpg)
40+
41+
We need just to make POST request to the `<url_of_site>/data` with XML payload to get the flag.
42+
43+
Let's check the format for XML request. Just click button on the site and look the request format in `Network` tab:
44+
45+
![Screenshot of the debug tab](5.jpg)
46+
47+
Now just send `POST` request with our payload and obtain the flag:
48+
49+
![Screenshot of the flag](6.jpg)

0 commit comments

Comments
 (0)