|
1 | 1 | # CTF Style Laravel Pentesting Excercise
|
2 | 2 |
|
3 |
| -This exercise has been test driven and developed on MacOS & Docker. |
4 |
| -Any other configurations will certainly need tweaking in certain parts, so be prepared to debug as you go along. |
5 |
| -Debian based distros like Ubuntu and Kali Linux should work pretty well. |
| 3 | +This exercise has been test driven and developed on MacOS & Docker. |
| 4 | + |
| 5 | +Any other configurations will certainly need tweaking in certain parts, so be prepared to debug as you go along. |
| 6 | + |
| 7 | +Debian based distros like Ubuntu and Kali Linux should work pretty well. |
6 | 8 |
|
7 |
| -Basic PHP, Docker, *nix cli and Laravel knowledge are a must for this exercise. |
8 |
| -If you're lacking any of these, prepare to learn and tackle _a lot of_ issues as you proceed with this exercise. |
| 9 | +Basic PHP, Docker, *nix cli and Laravel knowledge are a must for this exercise. |
| 10 | +If you're lacking any of these, prepare to learn and tackle _a lot of_ issues as you proceed with this exercise. |
9 | 11 |
|
10 | 12 | # !! Disclaimer !!
|
11 |
| -This is *NOT* a copy-paste style exercise. |
12 |
| -There are *actual* steps that you need to do and learn in order to successfully complete the exercise. |
13 |
| -The goal of this exercise is to teach you hands-on basic exploitation techniques that will threaten a poorly engineered PHP/Laravel application. |
14 |
| -By understanding how to exploit _stupid_ mistakes like not validating file uploads, or echoing user input raw into DOM, you'll hopefully be less likely to do these mistakes at your day-to-day life & work. |
| 13 | +This is **NOT** a copy-paste style exercise. |
| 14 | + |
| 15 | +There are **actual** steps that you need to do and learn (_and to search Google, quite a bit actually_) in order to successfully complete the exercise. |
| 16 | + |
| 17 | +The goal of this exercise is to teach you hands-on basic exploitation techniques that will threaten a poorly engineered PHP/Laravel application. |
| 18 | + |
| 19 | +By understanding how to exploit _stupid_ mistakes like not validating file uploads, or echoing user input raw into DOM, you'll hopefully be less likely to do these mistakes at your day-to-day life & work. |
15 | 20 |
|
16 | 21 | ## There are 5 different vulnerabilities & exploits included in this exercise.
|
17 | 22 |
|
@@ -100,12 +105,16 @@ By understanding how to exploit _stupid_ mistakes like not validating file uploa
|
100 | 105 | * Congratulations, you've just rooted the machine & completed the exercise.
|
101 | 106 |
|
102 | 107 | # Issues
|
103 |
| -Preferably open a PR directly rather than an issue if you find something wrong in the app and/or its documentation. |
104 |
| -As the license states this software comes "as is" with absolutely no warranty whatsoever, and therefor isn't guaranteed to be maintained and/or updated even if found faulty. |
| 108 | +Preferably open a PR directly rather than an issue if you find something wrong in the app and/or its documentation. |
| 109 | + |
| 110 | +As the license states this software comes "as is" with absolutely no warranty whatsoever, and therefor **isn't guaranteed** to be maintained and/or updated even if found faulty. |
105 | 111 |
|
106 | 112 | # Developing Further
|
107 |
| -Yes, eg. configuring a Selenium container (_via Laravel Dusk for example_) to trigger the XSS exploit code would be epic, rather than having to fire it manually like currently is the case. |
108 |
| -Feel free to open a PR do that if you feel like doing so. Feature wise however lets keep the application as it is, to not broaden its scope into an unmaintainable mess. |
| 113 | +Yes, eg. configuring a Selenium container (_via Laravel Dusk for example_) to trigger the XSS exploit code would be epic, rather than having to fire it manually like currently is the case. |
| 114 | + |
| 115 | +Feel free to open a PR for such if you get inspired. |
| 116 | + |
| 117 | +Feature wise however lets keep the application as it is, to not broaden its scope into an unmaintainable mess. |
109 | 118 |
|
110 | 119 | # License
|
111 | 120 | MIT - see LICENSE file
|
0 commit comments