gr33ppđź’€machine:~#

Curiosity.

View on GitHub

Compromised Account

Category: Networking

Image of challenge

We were told to find the account that was compromised as a result of the attack. Going through the packets, I found multiple HTTP POST request trying to bruteforce the login page.

Image of clue

In the picture, packet 7025 was the last bruteforce attempt and the response, packet 7027 gave a login successful reponse and a 302 redirect to the dashboard.

Image of solution

Here we can see the email and password as tareq@gmail.com and tareq@nanomate respectively. On the dashboard response packet, we could see the username as tareq.

Flag: BDSEC{tareq_tareq@nanomate}