Skip to content

Commit 07e6932

Browse files
authored
Update README.md
1 parent 6ff38c3 commit 07e6932

File tree

1 file changed

+4
-4
lines changed
  • Advent-of-Cyber-2021/Day-07-Migration_Without_Security

1 file changed

+4
-4
lines changed

Advent-of-Cyber-2021/Day-07-Migration_Without_Security/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,18 @@
22

33
- Interact with the MongoDB server to find the flag. What is the flag?
44

5-
- `***{********************************}`
5+
- `***{********************************}`
66

77
We discussed how to bypass login pages as an admin. Can you log into the application that Grinch Enterprise controls as admin and retrieve the flag?
88

99
Use the knowledge given in AoC3 day 4 to setup and run Burp Suite proxy to intercept the HTTP request for the login page. Then modify the POST parameter.
1010

11-
- `***{********************************}`
11+
- `***{********************************}`
1212

1313
- Once you are logged in, use the gift search page to list all usernames that have guest roles. What is the flag?
1414

15-
- `***{********************************}`
15+
- `***{********************************}`
1616

1717
- Use the gift search page to perform NoSQL injection and retrieve the mcskidy record. What is the details record?
1818

19-
- `*************************************`
19+
- `*************************************`

0 commit comments

Comments
 (0)