ctf-writeup/2023/DanteCTF 2023/Dante Barber Shop
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

Dante Barber Shop

Welcome to our renowned barber shop! Your task, should you choose to accept it, is to uncover hidden information and retrieve the sensitive data that the owners may have left around.

About the Challenge

We were given a website about barber, there are 6 images in the homepage

preview

And also there is an admin panel functionality

preview_2

How to Solve?

At first, I tried to bypass the login by using SQL and NoSQL injection payloads, but the attempt failed. Then, I checked the homepage and noticed something peculiar about the filenames of each image.

images

Because barber1.jpg was missing, I tried to access the image by visiting https://barbershop.challs.dantectf.it/img/barber1.jpg, and luckily, we obtained a user credential.

user

Use that credential to login to the website, and inside the admin panel, there is a search functinality and also a table containing customer list

search

This functionality was vulnerable to SQLite injection, and in this case I will extract the admin credential using this payload

' union select 1,(SELECT username from users),(SELECT password from users),4-- -

sqli

Use that admin credential to login to admin panel again to obtain the flag

flag

DANTE{dant3_1s_inj3cting_everyb0dy_aaxxaa}