Natas Level 19
We predict “random” PHPSESSID
to get to next Level
Quest
We are presented with below page
Solution
As per the message, this level is similar to previous level, with only difference that session ID’s are no longer sequential.
In previous level we incremented the session id by 1 (till 640) and somewhere in between we got admin session.
Here we will follow same approach but instead of incrementing, we have to find a pattern in the Session Token.
Let’s see what cookie is being set here.
Above we see, session ID being set PHPSESSID=39312d61646d696e
. At first glance, it looks “random”.
Lets use Burp Sequencer to collect more of those. We select the POST request and sent to sequencer
After we run the sequencer, we end up with lot of tokens, and a pattern begin to emerge
Now, i removed the string 2d61646d696e
from all tokens and then sort it and it becomes clear
See a pattern, 3#2d61646d696e
, then 3#3#2d61646d696e
, then 3#3#3#2d61646d696e
(# goes from 0 - 9)
We now make use of burp intruder to brute force all these requests. I got it with the third time. See below Above we can see, we used the clusterbomb attack type with 3 payloads, each going from 0 to 9.
Finally, password for next level is revealed.