🎯Skills Assessment

🎯 Objective: Comprehensive skills assessment demonstrating attack chaining across multiple web vulnerabilities to achieve privilege escalation and flag extraction.

Overview

This assessment combines three major attack vectors from the Web Attacks module:

  1. IDOR (Insecure Direct Object References) - User enumeration and token extraction

  2. HTTP Verb Tampering - Authorization bypass

  3. XXE Injection - Sensitive file disclosure

Target Goal: Read the flag at /flag.php


Attack Chain Walkthrough

Phase 1: Initial Access & IDOR Discovery

Step 1: Login with Provided Credentials

# Default credentials for initial access
Username: htb-student
Password: Academy_student!

Methodology:

  1. Open Network tab in Developer Tools (F12)

  2. Login and monitor HTTP requests

  3. Identify API endpoints in network traffic

Step 2: Discover IDOR in User API

API Endpoint Discovered: /api.php/user/74

Initial Request Analysis:

Response:

Step 3: Test IDOR Vulnerability

Manual IDOR Testing:

Vulnerability Confirmed: βœ… Returns data for other users without authorization


Phase 2: User Enumeration & Admin Discovery

Step 4: Mass User Enumeration

Automated Enumeration Script:

Execution:

Step 5: Identify Administrative Users

Search for Admin Privileges:

🎯 Target Identified: User a.corrales (UID: 52) has Administrator privileges


Phase 3: Token Extraction via IDOR

Step 6: Analyze Password Reset Functionality

Discovery Process:

  1. Navigate to Settings β†’ Change Password

  2. Monitor network requests in Developer Tools

  3. Identify token retrieval endpoint

Token API Discovered: /api.php/token/74

Normal Token Request:

Step 7: Extract Admin User Token

IDOR Token Extraction:

πŸ”‘ Admin Token Obtained: e51a85fa-17ac-11ec-8e51-e78234eb7b0c


Phase 4: HTTP Verb Tampering for Authorization Bypass

Step 8: Analyze Password Reset Mechanism

Reset Password Endpoint: /reset.php

Normal POST Request Structure:

Step 9: Attempt Direct Password Reset (Fails)

Direct Reset Attempt:

Step 10: HTTP Verb Tampering Bypass

Generate Strong Password:

Bypass with GET Method:

βœ… Success: Authorization bypass via HTTP verb tampering


Phase 5: Admin Access & XXE Discovery

Step 11: Login as Administrator

Admin Login:

New Features Unlocked:

  • βœ… Administrative dashboard access

  • βœ… "ADD EVENT" functionality (previously hidden)

Step 12: Discover XXE Injection Point

Event Creation Analysis:

  1. Navigate to ADD EVENT functionality

  2. Fill form with dummy data

  3. Intercept request in Burp Suite/Network tab

XXE Injection Point Found:

🎯 XML Input Identified: Application accepts XML data for event creation


Phase 6: XXE File Disclosure

Step 13: Craft XXE Payload for Flag Extraction

XXE Payload Construction:

Payload Breakdown:

  • <!DOCTYPE replace [...]> - External entity definition

  • php://filter/convert.base64-encode/resource=/flag.php - PHP filter to avoid XML parsing issues

  • &xxe; - Entity reference in name field (displayed in response)

Step 14: Execute XXE Attack

Manual Exploitation:

Response Contains Base64:

Step 15: Decode Flag

Base64 Decoding:

πŸ† Final Flag: HTB{...}


Attack Chain Summary


Key Learning Points

1. IDOR Exploitation Techniques

  • βœ… Sequential ID enumeration (1-100)

  • βœ… API endpoint discovery through traffic analysis

  • βœ… Multi-step IDOR (user data β†’ tokens)

  • βœ… Privilege escalation via user enumeration

2. HTTP Verb Tampering Applications

  • βœ… Authorization bypass (POST β†’ GET conversion)

  • βœ… Session-based security control evasion

  • βœ… Parameter injection through URL manipulation

3. XXE Injection for File Disclosure

  • βœ… PHP filter usage for binary/special character handling

  • βœ… Entity reference in XML elements

  • βœ… Base64 encoding/decoding for file extraction

4. Attack Chaining Methodology

  • βœ… Reconnaissance β†’ Traffic analysis and endpoint discovery

  • βœ… Vulnerability Assessment β†’ Systematic testing across attack vectors

  • βœ… Exploitation β†’ Combining multiple vulnerabilities for privilege escalation

  • βœ… Post-Exploitation β†’ Administrative access and sensitive data extraction


Defensive Recommendations

IDOR Prevention

HTTP Method Restrictions

XXE Prevention


Tools & Resources

Automation Scripts

  • User Enumeration: Custom bash script for IDOR testing

  • Burp Suite: Request modification and response analysis

  • curl: Command-line HTTP testing and exploitation

Detection Techniques

  • Network Traffic Analysis: Browser Developer Tools

  • Response Pattern Recognition: Identifying successful vs. failed requests

  • Parameter Manipulation: Systematic testing of input vectors

πŸ’‘ Skills Demonstrated: This assessment showcases the critical importance of defense-in-depth and proper input validation across all application layers.

Last updated