webmedium

Desires

hackthebox

Task: Forge an admin session in a Go Fiber web app to access the flag page. Solution: Exploit session puzzling (Redis stores session ID before authentication), predictable sha256(timestamp) session IDs, and tar symlink escape via mholt/archiver/v3 to write a forged admin session JSON file through a symlink to /tmp/sessions.

$ ls tags/ techniques/
session_puzzlingtar_symlink_escapepredictable_session_brute_forcesession_forgerysymlink_directory_traversal

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]