Skip to content

Commit bf9bd02

Browse files
authored
Create Lab 2: Exploiting NoSQL operator injection to bypass authentication.md
1 parent 748b8ec commit bf9bd02

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
# Lab 2: [Exploiting NoSQL operator injection to bypass authentication](https://portswigger.net/web-security/nosql-injection/lab-nosql-injection-bypass-authentication)
2+
3+
![image](https://github.com/user-attachments/assets/bc791cbd-490d-47e3-abca-5469af225386)
4+
5+
In this lab scenario,the login functionality is backed by a MongoDB NoSQL database and is vulnerable to injection using MongoDB query operators.
6+
7+
Objective: Exploit the NoSQL injection vulnerability to log in as the `administrator` user.
8+
9+
You can also log in to your own account using the following credentials:
10+
* Username: `wiener`
11+
* Password: `peter`
12+
13+
![image](https://github.com/user-attachments/assets/2c93e330-d90f-44c9-b9b1-42e9d8d6dbf2)
14+
15+
### Accessing the Lab
16+
Step 1: Click on "My Account".
17+
18+
![image](https://github.com/user-attachments/assets/02dcaf39-0a1b-4c95-8cf9-d431b84b7cc7)
19+
20+
* Get Login with gievn credentials `wiener:peter`
21+
* Open Burp Suite and ensure Intercept is turned ON.
22+
* Login and capture the request in Burp.
23+
24+
![image](https://github.com/user-attachments/assets/b1619aab-8e6e-4774-bb8b-7972b7953fb1)
25+
26+
Send this Request to Repeater to check

0 commit comments

Comments
 (0)