π―Skills Assessment
Overview
Attack Chain Walkthrough
Phase 1: Initial Access & IDOR Discovery
Step 1: Login with Provided Credentials
# Default credentials for initial access
Username: htb-student
Password: Academy_student!Step 2: Discover IDOR in User API
Step 3: Test IDOR Vulnerability
Phase 2: User Enumeration & Admin Discovery
Step 4: Mass User Enumeration
Step 5: Identify Administrative Users
Phase 3: Token Extraction via IDOR
Step 6: Analyze Password Reset Functionality
Step 7: Extract Admin User Token
Phase 4: HTTP Verb Tampering for Authorization Bypass
Step 8: Analyze Password Reset Mechanism
Step 9: Attempt Direct Password Reset (Fails)
Step 10: HTTP Verb Tampering Bypass
Phase 5: Admin Access & XXE Discovery
Step 11: Login as Administrator
Step 12: Discover XXE Injection Point
Phase 6: XXE File Disclosure
Step 13: Craft XXE Payload for Flag Extraction
Step 14: Execute XXE Attack
Step 15: Decode Flag
Attack Chain Summary
Key Learning Points
1. IDOR Exploitation Techniques
2. HTTP Verb Tampering Applications
3. XXE Injection for File Disclosure
4. Attack Chaining Methodology
Defensive Recommendations
IDOR Prevention
HTTP Method Restrictions
XXE Prevention
Tools & Resources
Automation Scripts
Detection Techniques
Last updated