Greetings everyone, this is Shobhit Kumar Gangwar and today I'm going to share one of my recent discoveries which is quite interesting.This is basically an Authentication Bypass which I found on a program on intigriti a few days ago. I'll be referring the target as redacted.com / Redacted Org.
This target was an update server of a very big organisation and was using netSUS ( NetBoot and Software Update services ) which is basically now deprecated by apple .
When I visited https://jamfdp.redacted.com , I was presented with a login screen as below.
Entering Default Credentials did not work .
But I noticed that the response of login was returned a bit slow . So on checking burp history , I found out that the server is returning a 302 Response Code and then was redirecting me to login page .
The next thing I knew was response manipulation . Tried visiting /dashboard.php directly and the response retured was again a 302 Response Code as below .
After noticing this 302 Response Code , only one thing came into my mind was what if I change 302 to 200 .
On Chaning the response code , I was presented with the dashboard of the server and thus bypassing the Authenticaion of the portal as below .
The server contained numerous logs and update binaries and much more ...
Always keep an eye over server response time and burp history .