Compromised Account
Category: Networking
We were told to find the account that was compromised as a result of the attack. Going through the packets, I found multiple HTTP POST request trying to bruteforce the login page.
In the picture, packet 7025 was the last bruteforce attempt and the response, packet 7027 gave a login successful reponse and a 302 redirect to the dashboard.
Here we can see the email and password as tareq@gmail.com
and tareq@nanomate
respectively. On the dashboard response packet, we could see the username as tareq.
Flag: BDSEC{tareq_tareq@nanomate}