Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit dc3970d

Browse files
committed
Update
1 parent 79f0d1d commit dc3970d

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

houseccon-2015-august/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ ebiRib
5353

5454
Pass one of our answers to rumkin and look at answers.
5555

56-
![Picture of solved substitution vipher](/pics/cap.png)
56+
![Picture of solved substitution vipher](/houseccon-2015-august/pics/cap.png)
5757

5858
Due to the theme, try `POTATO` and register as user
5959

@@ -82,7 +82,7 @@ PE32 executable for MS Windows (console) Intel 80386 Mono/.Net assembly
8282

8383
![Are you kidding me](http://images.sodahead.com/polls/004110707/235434734_Are_You_Kidding_Me_answer_11_xlarge.jpeg)
8484

85-
Oh well, it's .NET. We know that .NET can be decompiled to source using (dotPeek)[https://www.jetbrains.com/decompiler/].
85+
Oh well, it's .NET. We know that .NET can be decompiled to source using [dotPeek](https://www.jetbrains.com/decompiler/).
8686

8787
Looking at the source, it looks like we are given a fake terminal to attempt to wardial a given phone number. We are also given an area code and a set of prefixes. The source shows that if a certain `Dial` function succeeds, the terminal closes. We should be able to brute force this:
8888

@@ -171,7 +171,7 @@ Password
171171
aaaa
172172
```
173173

174-
![Admin Panel](/pics/admin-panel.png)
174+
![Admin Panel](/houseccon-2015-august/pics/admin-panel.png)
175175

176176
## Get dat IP
177177
```
@@ -186,7 +186,7 @@ Seeing a message box and a few "Active" users, hints strongly towards Cross-Site
186186
<img/src="./"/onerror="&#0097;&#00108;&#00101;&#00114;&#00116;&#0040;&#0039;&#0088;&#0083;&#0083;&#0039;&#0041;">
187187
```
188188

189-
[XSS 1](/pics/xss-1.png)
189+
[XSS 1](/houseccon-2015-august/pics/xss-1.png)
190190

191191

192192
Our next task, is to test if our "Active" users are actually active. Sending a simple `<IMG>` tag to `ctaroot` trying to access an image on my AWS instance gives a successful request.

0 commit comments

Comments
 (0)