We started the ZIUR classroom with our first meeting on June 22nd. The objective of this seminar was to learn some techniques of web exploitation and post-exploitation privilege escalation, in particular:
To do so, we took on My Awesome Photoblog, a general-purpose blog where users work with security measures that leave much to be desired. We then discovered how an incorrect treatment of URL parameters can lead us to become root users of the server where the web page is hosted.
From here you can access the tools used for the seminar, as well as a series of videos where Juanan explains step by step the solution. You also have available the writeup of the machine, with some additions (such as cracking the administrator password and explanations of some topics to go into more detail) and focused from the Kali distribution instead of Windows.
After pwning the machine, we concluded the seminar with the proposal of some exercises to work on our own, in which we included:
This was the first and last seminar of the 2021-2022 course, a bit introductory but at the same time a good way to open the doors to the world of web pentesting. We are looking forward to next year, where we will learn many more techniques to get started in malware analysis, reversing, cryptography… but not only that, we will also have talks from high caliber guests!