webmedium
Desires
hackthebox
Task: Forge an admin session in a Go Fiber web app to access the flag page. Solution: Exploit session puzzling (Redis stores session ID before authentication), predictable sha256(timestamp) session IDs, and tar symlink escape via mholt/archiver/v3 to write a forged admin session JSON file through a symlink to /tmp/sessions.
$ ls tags/ techniques/
gofile-uploadpath-traversalfibersession-puzzlingsymlink-attacktar-symlinkpredictable-session-idfile-based-sessionsredisarchiver-v3
session_puzzlingtar_symlink_escapepredictable_session_brute_forcesession_forgerysymlink_directory_traversal
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]