ADVANCED XSS AND CSRF EXPLOITATION - Skills Assessment

Hey bud can you give a hint for the second part? I’m a moderator already and I’m trying to exfiltrate the content of admin.php but I’m getting blocked by CORS and CPS, either way I used the file upload/task functionalities and the exploitserver :grimacing: :grimacing: :grimacing:

thanks, appreciate some help here!

[update]
Correct me if I’m wrong, but I think the exploitation here involves calling the file with the payload from the task to exfiltrate the content of admin.php, right? Am I at least on the right track with this?

Hi everyone, currently stuck on Advanced XSS and CSRF Exploitation skills assessment where I managed to extract the admin.php page and find the hidden API but keep getting {“error”:“Please specify a customer ID”}, tried fuzzing bunch of params but none worked, any hints?

managed to solve with help from others, /:id form of supplying the ID parameter and not through the GET parameter. /:id is a convention from frameworks

Hi, I can become moderator, but I am stuck at that point. I can XXS, but when I run the script I just get redirected to the login page. It’s driving me crazy. According to your suggestions I should use one of the allowed file types. At the moment, I just successfully run as text files. I suppose that it’s the missing point. Could anybody please help me? Thanks a lot.

P.S. I am also on Discord, same user.

send the xss script url to the admin through the page u have access to with the moderator role, extract the admin home page to see what other links are accessible by the admin

This is what I did and this is where I am stuck. The page that should be the exported admin home page is a failed login page to admin. So, I am sure I am doing something wrong, but I don’t get what exactly.

@ [sh3n2002] thanks a lot! It seems that I was on the right track since days, but I was mistakenly using the open redirect to get the admin page instead than requesting it directly…

Hi everyone, I’ve been stuck all day and cannot get to promote to moderator. I’ve try to send the CSRF > Open Redirect script through exploitserver.htb, uploaded various files with different payloads (mostly png) and nothing. I saw there’s no execution when I upload the file so I tried some encodings with no luck. I know there’s must be some dumb thing that I am overlooking so any tip is welcome, cheers

DM if you still need assisstance

1 Like

I’ve been working on the “Advanced XSS and CSRF Exploitation Skills Assessment” module and have reached moderator status. I thought I could potentially exfiltrate data using methods like meta refresh, window.location, and XMLHttpRequest with different encoding techniques to bypass CSP and SameSite cookie restrictions. However, these approaches didn’t work, and I’m currently at a standstill.

Would anyone be able to provide a hint or some guidance via DM? Any help would be greatly appreciated!

hey man, i need some huge assistance on this skill assessment

I just finished this assessment. DM me if you need help.