[Day 7] Migration Without Security
{Web Exploitation = NoSQLi}
Last updated
{Web Exploitation = NoSQLi}
Last updated
Logging into the server with the given credentials, I was able to interact with the MongoDB and retrieve the first flag.
Interact with the MongoDB server to find the flag. What is the flag?
THM{8814a5e6662a9763f7df23ee59d944f9}
The following page is being served on port 80/HTTP
Useful MongoDB Operators
Bypassing the login page is as simple as using the $ne
operator on the password field.
We're in.
THM{b6b304f5d5834a4d089b570840b467a8}
Once you are logged in, use the gift search page to list all usernames that have guest roles. What is the flag?
THM{2ec099f2d602cc4968c5267970be1326}
Use the gift search page to perform NoSQL injection and retrieve the mcskidy record. What is the details record?
ID:6184f516ef6da50433f100f4:mcskidy:admin