Skip to content

Latest commit

 

History

History
53 lines (34 loc) · 1.2 KB

kbid-XXX-client-side-restriction-bypass.md

File metadata and controls

53 lines (34 loc) · 1.2 KB

KBID XXX - Client Side Restriction Bypass (client-side-restriction-bypass)

Running the app

$ sudo docker pull blabla1337/owasp-skf-lab:client-side-restriction-bypass
$ sudo docker run -ti -p 127.0.0.1:5000:5000 blabla1337/owasp-skf-lab:client-side-restriction-bypass

{% hint style="success" %} Now that the app is running let's go hacking! {% endhint %}

Running the app Python3

First, make sure python3 and pip are installed on your host machine. After installation, we go to the folder of the lab we want to practise "i.e /skf-labs/XSS/, /skf-labs/jwt-secret/ " and run the following commands:

$ pip3 install -r requirements.txt
$ python3 <labname>

{% hint style="success" %} Now that the app is running let's go hacking! {% endhint %}

Docker image and write-up thanks to Contrahack.io !

Reconnaissance

Exploitation

And goal achieved! We could bypass the client-side restrictions.

Additional sources