Skills Assessment
Scenario
Attack Chain Overview
1. SMTP Header Injection β Discover hidden admin path
2. TE.CL via TE.TE β Bypass WAF blocking CRLF
3. Request Smuggling β Access hidden admin panelPhase 1: Reconnaissance
Contact Form Discovery
Initial Request
Phase 2: SMTP Header Injection (Blocked)
First Attempt
Result
Phase 3: Bypass WAF via TE.CL (TE.TE Substring)
Vulnerability Type
Crafting the Payload
Key Points
Element
Purpose
Chunk Size Calculation
Burp Configuration
Phase 4: Check Email
Navigate to Inbox
Expected Email
Phase 5: Access Hidden Admin Panel
Challenge
Solution
Exploit Requests
Chunk Size
Burp Configuration
Expected Results
Request
Expected Response
Attack Summary
Techniques Combined
Technique
Module Section
Key Takeaways
References
Last updated