CsharpVulnSoap

日期

Validations

8 Compromissions 10%

Note  Notation

1 vote

Description

The CsharpVulnSoap virtual appliance is a purposefully vulnerable SOAP service, focusing on using XML, which is a core feature of APIs implemented using SOAP. The web application, listening on port 80, allows you to list, create, and delete users in the PostgreSQL database. The web application is written in the C# programming language and uses apache+mod_mono to run. The main focus of intentional vulnerabilities was SQL injections.

The vulnerable SOAP service is available on http:///Vulnerable.asmx, and by appending ?WSDL to the URL, you can get an XML document detailing the functions exposed by the service. Using this document, you can automatically fuzz the endpoint for any vulnerabilities by parsing the document and creating the HTTP requests expected programmatically.

The SQL injections yield a variety of potential exploit techniques since different SQL verbs are used to perform actions against the server. For instance, a SQL injection in an INSERT statement may not be exploitable in the same ways the DELETE or SELECT statements will be. Using a tool like sqlmap will help you learn how to exploit each SQL injection vulnerability using a variety of techniques.

If you are curious how sqlmap is performing the checks for, and ultimately exploiting, the vulnerabilities in the web application, you can use the —proxy option for sqlmap and pass the HTTP requests through Burpsuite. You can then see in the HTTP history tab the raw HTTP requests made by sqlmap.

Temps de compromission

4 heures

Système d'exploitation

 linux

démarrer cet environnement virtuel

Résultats du CTF alltheday Résultats du CTF alltheday pour CsharpVulnSoap

Pseudonyme Environnement Virtuel Nombre d'attaquant Date de début Environnement compromis en
michmich CsharpVulnSoap 1 2018年5月25日 to 21:18 0h06
- CsharpVulnSoap 0 2018年2月12日 to 19:05 -
- CsharpVulnSoap 1 2018年2月12日 to 14:36 -
- CsharpVulnSoap 0 2017年11月16日 to 16:29 -
- CsharpVulnSoap 1 2017年8月1日 to 01:39 -

 175 Environnements Virtuels

Résultats 名字 Validations Difficulté  Difficulté 作者 Note  Notation
pas_valide Metasploitable 2 40% 8538
pas_valide Basic pentesting 1 32% 4619
pas_valide LAMP security CTF5 25% 3862
pas_valide Docker - I am groot 51% 2955 Ech0
pas_valide LAMP security CTF4 35% 2710
pas_valide SSH Agent Hijacking 26% 2339 mayfly
pas_valide SSRF Box 18% 1735 sambecks
pas_valide Metasploitable 12% 1717
pas_valide Mr. Robot 1 21% 1636
pas_valide End Droid 35% 1202
pas_valide Imagick 22% 1019 sambecks
pas_valide SamBox v2 13% 973 sambecks
pas_valide Kioptrix level 2 25% 971
pas_valide Docker - Sys-Admin’s Docker 41% 929 Ech0
pas_valide LAMP security CTF7 39% 887
pas_valide VulnVoIP 17% 845
pas_valide SamBox v1 7% 722 sambecks
pas_valide Docker - Talk through me 42% 626 Ech0
pas_valide Well-Known 10% 614 sm0k
pas_valide Django unchained 22% 606 TiWim
pas_valide LAMP security CTF6 18% 602
pas_valide Kioptrix level 3 33% 575
pas_valide Windows - Group Policy Preferences Passwords 25% 566
pas_valide Shared Objects Hijacking 13% 555 das
pas_valide BreakingRootme2020 15% 505 Laluka
pas_valide Awky 8% 494 sbrk
pas_valide Windows XP pro 01 5% 493 g0uZ
pas_valide Kioptrix level 4 35% 461
pas_valide Rootkit Cold Case 16% 456 franb
pas_valide Windows - KerbeRoast 19% 420
pas_valide Websocket - 0 protection 6% 419 Worty
pas_valide Bluebox - Microsoft Pentest 4% 416
pas_valide pWnOS 32% 400
pas_valide Windows - ASRepRoast 35% 380
pas_valide Hackademic RTB1 19% 364
pas_valide DC-1 15% 343
pas_valide SamBox v3 5% 333 sambecks
pas_valide Bluebox 2 - Pentest 3% 306 sambecks
pas_valide Exploit KB Vulnerable Web App 12% 306
pas_valide Holynix v1 24% 292
pas_valide SAP Pentest 7% 291 iggy
pas_valide LAMP security CTF8 14% 289
pas_valide /dev/random : Pipe 5% 235
pas_valide A bittersweet shellfony 12% 230 mayfly
pas_valide LordoftheRoot 25% 230
pas_valide Hopital Bozobe 8% 228 sambecks
pas_valide Acid: Server 12% 218
pas_valide FristiLeaks 1.3 29% 215
pas_valide SkyTower 24% 213
pas_valide Ubuntu 8.04 weak 5% 206 g0uZ