webProeasy
Microchip
hackerlab
Task: Corporate website with Django DEBUG mode enabled. Solution: Exploited DEBUG mode to discover API endpoints, extracted password hash from /api/v2/get_users/, cracked SHA-256 hash with hashcat, and authenticated to get the flag.
$ ls tags/ techniques/
api_enumerationsha256authentication_bypassinformation_disclosuredjangodebug_modepassword_hashhashcat
Django DEBUG mode URL disclosureAPI endpoint enumerationPassword hash extraction via APISHA-256 hash cracking with hashcat
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Tokens— hackerlab
- [crypto][Pro]MACdonalds— hackerlab
- [forensics][Pro]Новый сотрудник 2 (New Employee 2)— hackerlab
- [infra][Pro]Будущий релиз (Future Release)— hackerlab
- [web][free]Six-Seven— alfactf