webeasy
Microchip
hackerlab
Task: Corporate website with Django DEBUG mode enabled. Solution: Exploited DEBUG mode to discover API endpoints, extracted password hash from /api/v2/get_users/, cracked SHA-256 hash with hashcat, and authenticated to get the flag.
$ ls tags/ techniques/
api_enumerationsha256authentication_bypassinformation_disclosuredjangodebug_modepassword_hashhashcat
Django DEBUG mode URL disclosureAPI endpoint enumerationPassword hash extraction via APISHA-256 hash cracking with hashcat
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]