It seems to be kinda shop. If I try to login I get a Forbidden error:
I have to bypass this, so I captured the request with Burp:
With /../auth/login
I can bypass it :D
If we read the entrypoint.sh
we notice that there is a random user created, so might be a SQLi vulnerability on the login:
I captured the request and try some SQLis:
It actually worked with admin' OR 1=1 -- -
(URL encoded) :D
Now I got into a 2FA panel verification:
Inspecting the source code, I noticed that the 2FA code has 4 digits, so I can try to bruteforce it:
So I decided to create a python script to bruteforce it:
Since the 2fa code valid time is 5 mins, Iโm splitting the wordlist into 5 wordlists of 2000 words each
I created the wordlists with the following commands:
I executed different intervals at same time:
Finally got it :D
Challenge completed!