First Steps:

Once you have started the CTF machine, launch a root shell in Kali and do the following:

Untitled

Start with an Nmap:

Untitled

Here’s the index.html with a brief explanation of what to expect:

Untitled

This challenge highlights CORS (Cross-Origin Resource Sharing.) Through the attack demonstrated here, you'll learn why CORS policies are essential for the integrity and security of web applications and how they prevent unwanted cross-origin requests.

Although we don’t exploit a CORS misconfiguration, understanding how to read CORS-specific headers is essential for the final exploit.

Before attacking the site, let’s work with CORS in a controlled environment to get a solid understanding of the mechanisms involved.

Do the following: