Challenge 1:
Name: Poison Null Byte
Description: Bypass a security control with a Poison Null Byte to access a file not meant for your eyes.
Difficulty: 4 star
Category: Improper Input Validation
Expanded Description: https://pwning.owasp-juice.shop/part2/improper-input-validation.html
Challenges 2-5:
Name: Easter Egg, Forgotten Developer Backup, Forgotten Sales Backup, and Misplaced Signature File
Tools used:
Burp, FoxyProxy
Resources used:
Methodology:
The Poison Null Byte challenge is one of my favorites, because it’s such a simple trick that opens up so many seemingly closed doors on the FTP page. First, we need to know what the restrictions are on what we can and can’t download.
OK, so only .md and .pdf files can be downloaded. Fair enough. But by using a URL encoded null byte (%2500), it’s possible to bypass this restriction. Basically what we’re doing here is saying “I want file X.gg”, and letting the null byte do two things. First, it allows you to add new file extensions to GET requests to bypass the filetype restriction. Second, it serves as a break between the intended filename and any added file extension so that the correct file is downloaded.
The key is to put that URL encoded null byte at the end of the file extension, then add “.md” after it. Then, download all of the things! Seriously, download everything but the quarantined malware. The rest of the images in this post will be which files lead to challenge solutions.






![Response
Headers
PretO'
Render
200 0K
Actions
12
Access-Cont rol -Allow-Origin:
X-Content -Type-options: nosniff
X-Frame-options: SAMEORIGIN
Feature-policy: payment 'self'
Accept -Ranges: bytes
Cache-Cont rot: public, max-age=O
Last -Modified: Mon, 14 sep 2020 08:01 GI•TT
" 114b -1748ba27d20
Content -Type: application/ octet -st ream
Content -Length: 4427
Date: Thu, OS Nov 2020 23: 43:24 Gl•rr
Connection: close
'name
'juice-shop
6. 2. O- SNAPSHOT'
version
'description
An intentionally insecure JavaScript Web Application
'homepage
"http•
//owasp-juice.shop
author'
'8jörn Kimminich owasp.org/index.php/lJser:8j oern Kimminich)
'cont ributors
'8jörn Kimminich'
'8joern Kimminich'
'bjoern.kimminich'
'Jannik Hollenbach'
Aashish683
greenkeeper[bot]'
agrawaIarpit14",
'Ma rcRIer'
CaptainFreak
Supratik Das ,
aaryanIO ,
"m411cs ,
' -112934'
Josh Grossman
Aashish Singh'
"Timo Pagel
scar26
'Martin Rock-Evans ,
Alejandro Saenz
omerlh'
private
true,](https://curiositykillscolby.files.wordpress.com/2020/11/image-148.jpeg?w=854)




Prevention and Mitigation Strategies:
OWASP Input Validation Cheat Sheet
Lessons Learned:
Nothing. I’ve always liked the poison null byte, ever since I looked up why the YouTube channel Null Byte (where I spent/spend a lot of time) chose its name.