

kicks back `invalid username` as the error which makes me think we can brute the username and then maybe it'll kick back invalid password once we have the username


Turbo intruder pertinent script excerpt:
```
def handleResponse(req, interesting):
# currently available attributes are req.status, req.wordcount, req.length and req.response
if 'Invalid Password' in req.response:
table.add(req)
```
Now going to do the same for the password
```
if 'Invalid Password' not in req.response:
```

cookie is
`eyJjb29raWUiOiIxYjVlNWYyYzlkNThhMzBhZjRlMTZhNzFhNDVkMDE3MiIsImFkbWluIjpmYWxzZX0=`
which is
`{"cookie":"1b5e5f2c9d58a30af4e16a71a45d0172","admin":false}`
changing the `admin` value to `true` and changing the cookie gives us

The zip file has a password
`zip2john file.zip > forjohn`


---
Back to [[_WebSite Publish/CTF/CTF Index|CTF Index]]
Tags: #ctf #bruteforce #password_cracking #johntheripper #web
Related: