webProeasy

Microchip

hackerlab

Task: Corporate website with Django DEBUG mode enabled. Solution: Exploited DEBUG mode to discover API endpoints, extracted password hash from /api/v2/get_users/, cracked SHA-256 hash with hashcat, and authenticated to get the flag.

$ ls tags/ techniques/
Django DEBUG mode URL disclosureAPI endpoint enumerationPassword hash extraction via APISHA-256 hash cracking with hashcat

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups