webPromedium
Документальный архив (Documentary Archive)
hackerlab
Task: NoSQL Document Store with JSON API search endpoint. Solution: Used $or operator to bypass ACL filter and access hidden document, then blind NoSQL injection with $regex to extract flag from hidden field character-by-character.
$ ls tags/ techniques/
nosql_or_operator_acl_bypassblind_regex_data_exfiltrationfield_name_enumerationcharacter_by_character_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Просто найди его— hackerlab
- [infra][Pro]Будущий релиз (Future Release)— hackerlab
- [web][Pro]Скрытая документация (Hidden Documentation)— duckerz
- [web][Pro]Космический терминал (Cosmic Terminal)— duckerz
- [web][Pro]B64Decoder— hackerlab