Need some help with the HTTP Attacks - Skills Assessment. After massive headaches, I finally believe I have the proper attack chain – I’m submitting my post request (with malicious content), NOT getting a WAF error, AM getting a seemingly proper return (just as if I were to submit content which was NOT malicious)… but NOT getting the email… Please help. Thx.
EDIT: Solved. SWEAR I had tried the solution before, but clearly did something wrong as a clear-mind managed to get it.
Seems like I’m stuck at the same point. Tried different payloads, think everything’s correct. I can bypass the WAF while sending a malicious payload, but don’t get no email. How did you guys take that exercise?
If anyone can give some pointers here I’d appreciate!
I was able to perform the TE.CL via TE.TE but still get picked by the blacklisted characters. Don’t know if I have to double URL encode it or going through a rabbit hole
Yes tried the same, No email though.
If I am correct, the lab should be fairly easy. Hint is giving too much info. Its a shame still I am not able to solve it.
Edit: Completed
Hi @ju7LSOw, do you still remember how to solve this?
I can smuggle the http post request through TL.CE but still cannot get any mail.
I suspect the CRLF characters have been tampered by the WAF but got no idea how I can bypass it.
Could you please give some hints? thanks
For TE.CL to work, you need a modified the content-length. Make sure you performed the following step in Burp (Refer to the TE.CL section for more details):
disable the auto content-length update
create tab group
send request in a single connection
Also, make sure the GET request has 2 blanks line at the end (i.e. 2 blanks line after 0).