Skip to main content

Vulnerability Is Almost Everywhere!

As you all know(even if you dont know let me tell you) I am not any elite hacker. I am learning like all of you.May be it is because I haven't found vulnerability in any sites other than these challenge sites (myself),my confidence is very low.
But something occurred today that lifted my confidence a little higher.

what was it??

Well..first of all let me ask you, have you seen the game menu in this blog? which has hangman game for you to play? Well I was playing in it today and got wrong guess always..then i thought ,why on earth i can't win even this small game!!
 Then an Idea struck me!! what if like all this challenge site, there is vulnerability in this game which is a simple code i have copied from another website without even reading it!
I right clicked on the "Guess" button and  selected inspect!
 There i saw 


<input name="ratebutton" type="button" value="Guess" onclick="pruefeZeichen()">


now I know my input is given to the function pruefeZeichen()

I right clicked the site and selected "view-source"

there ctrl+f  to find and searched for pruefeZeichen()

i saw a script after the fuction is called ,


var lsgwoerter = [["T", "R", "E", "E", "H", "O", "U", "S", "E"],  ["J","A","V","A","S","C","R","I","P","T"],  ["W","E","B","D","E","S","I","G","N"],  ["E","D","U","C","A","T","I","O","N"],  ["C","H","O","C","O","L","A","T","E"],  ["G","E","R","M","A","N","Y"]]
var random = Math.floor((Math.random()*(lsgwoerter.length-1))); var lsgwort = lsgwoerter[random]; // the word to guess will be chosen from the array above



There it is...

there is only six words and if you count no. of dashes in the question, we can easily guess which word they want..

another method is,

when we search for fucntion we can see


var pruefeZeichen = function(){ var f = document.rateformular;  var b = f.elements["ratezeichen"];  var zeichen = b.value; // the letter provided by the user zeichen = zeichen.toUpperCase(); for (var i = 0; i < lsgwort.length; i++){  if(lsgwort[i] === zeichen){   ratewort[i] = zeichen + " ";   var treffer = true;  } b.value = "";
 }



From that its clear our input is checked with value in variable lsgwort

we know our word is stored in "lsgwort"
in our page  right click and select inspect, in that select console

below that type alert(lsgwort)

Hit enter and you will get the word as alert!


What lifted my confidence?

Now I understand here I didn't made  this vulnerability intentionally ,I was not even aware of it...similarly any new or old sites can have many vulnerabilities which the creators have missed to fix.

This is why there is a great chance for Ethical Hackers to help these guys to fix them and get paid by them.

Comments

Popular posts from this blog

Hack This Site Basic 8

Sam remains confident that an obscured password file is still the best idea, but he screwed up with the calendar program. Sam has saved the unencrypted password file in /var/www/hackthissite.org/html/missions/basic/8/  However, Sam's young daughter Stephanie has just learned to program in PHP. She's talented for her age, but she knows nothing about security. She recently learned about saving files, and she wrote a script to demonstrate her ability. So, we know the password is stored in some obscured password file.  Lets try the same code as we did in level 7. But the code 'ls' is not treated as command. so lets try it differently. Try with aaa;<!--ls--> it also failed but got a message: If you are trying to use server side includes to solve the challenge, you are on the right track: but I have limited the commands allowed to ones relevant towards finding the password file for security reasons(because there will always be that one person who decides to ...

Hack This Site! Basic 4

This time Sam hardcoded the password into the script. However, the password is long and complex, and Sam is often forgetful. So he wrote a script that would email his password to him auto And below this,There is a button for sending password to Sam's email.What we should do? right click on the button ,if you are in google chrome ,select > inspect . Now on right side you could see the script of that button. In this script you could see, <input type="hidden" name="to" value="sam@hackthissite.org"> Got any idea? yea , all you have to do is change the email to whatever  email you registered in Hackthis site ! Now check your mail,there must be the password you needed! Keep going!

Hack This Site Basic 11

Sam decided to make a music site. Unfortunately he does not understand Apache. This mission is a bit harder than the other basics. As you may have noticed! when we visit this level all we are given with is some line about song.This line changes on each refresh.From this we assume that this is not the real page we need to visit.But how we find our requirement? There is a tool in Kali Linux called 'Dirb'. But for now Iam using an online service for this >> URL FUZZER << . First we give the url and search for files with .php extension. select start scan.Wait for scan to finish. So,we have found a file.Now visit it as: https://www.hackthissite.org/missions/basic/11/index.php There is our login page.still we are stuck!we don't have the password or any hint in the source code of this page. Lets run another scan on the URL Fuzzer ,this time for directories  Same way start scan and wait for it to finish. There are two possible directori...