Hintru Propina ENES ← Todos los labs

Bugforge MesaNet

EN hard CTF challenge Web Cache PoisoningXSSHeader InjectionStored XSSCSRFBot ExploitationExfiltration
Original

MesaNet is a Black Mesa Transit rail broadcast panel running on Bugforge's lab infrastructure. The application caches API responses and reflects a custom header value directly into HTML, creating a chained attack path: poison the cache with a script injected via a custom header, then trick a bot into viewing the poisoned page — causing it to exfiltrate its private notes (and the flag) to an attacker-controlled webhook.

0/7
resueltos
Paso 1 Paso 2 Paso 3 Paso 4 Paso 5 Paso 6 Paso 7
enumeration

Paso 1 · Map the Rail API surface

Objetivo: Discover all available endpoints under the /api/rail/ path by fuzzing the application.

Contexto: You are authenticated to the MesaNet Access Panel (Clearance L3). A 'Rail Broadcasts' tab is visible in the dashboard. Intercept the traffic in Burp Suite and take note of the session cookie (connect.sid) — you will need it for authenticated fuzzing.

Pistas progresivas

Revela solo las que necesites. Claude lleva la cuenta de cuántas usaste para calibrar la retroalimentación.

Pista 1 — empujón direccional

The Rail Broadcasts page makes API calls. Try to find what other endpoints exist at the same base path.

Pista 2 — técnica / clase de vuln

Use a directory/endpoint fuzzing tool against the /api/rail/ path, passing your authenticated session cookie as a header so the server treats requests as logged in.

Pista 3 — casi la solución

Run ffuf against https://<lab-host>/api/rail/FUZZ using the common.txt wordlist, supplying the Cookie, Referer, and browser-like headers observed in Burp. Look for responses with status 200.

Tu intento

¿Encontraste algo para mejorar?

Puliendo la redacción, afinando una pista, agregando contexto que falta, corrigiendo un payload — tu versión queda separada de la original y otros aprendices pueden elegirla.

⚠ Reportar este lab

¿Te gusta Hintru? Buy me a coffee ☕ ☕