Skip to content

Commit 9cdbeac

Browse files
committed
Added Advent of Cyber 2025 Day 20
1 parent 3b58022 commit 9cdbeac

21 files changed

Lines changed: 199 additions & 0 deletions
Lines changed: 199 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,199 @@
1+
---
2+
title: "TryHackMe: Advent Of Cyber 2025 Day 20 (Race Conditions - Toy to The World)"
3+
categories: [TryHackMe]
4+
tags: [race condition, advent of cyber]
5+
render_with_liquid: false
6+
media_subpath: /images/tryhackme_aoc2025_day20/
7+
image:
8+
path: banner.png
9+
---
10+
11+
<h2 style="color:#A64AC9; text-align:center; font-weight:700; font-size:1.8em; text-shadow: 1px 0 #A64AC9, -1px 0 #A64AC9, 0 1px #A64AC9, 0 -1px #A64AC9;">
12+
The Story
13+
</h2>
14+
15+
[![TryHackMe Room Link](header.png){: width="1200" height="407" }](https://tryhackme.com/room/race-conditions-aoc2025-d7f0g3h6j9)
16+
17+
## Introduction
18+
19+
The Best Festival Company (TBFC) has launched its limited-edition SleighToy, with only ten pieces available at midnight. Within seconds, thousands rushed to buy one, but something strange happened. **More than ten lucky customers received confirmation emails stating that their orders were successful**. Confusion spread fast. How could everyone have bought the **"last"** toy? McSkidy was called in to investigate.
20+
21+
She quickly noticed that multiple buyers purchased at the exact moment, slipping through the system’s timing flaw. Sir Carrotbane’s mischievous Bandit Bunnies had found a way to exploit this chaos, flooding the checkout with rapid clicks. By morning, TBFC faced angry shoppers, missing stock, and a mystery that revealed just how dangerous a few milliseconds could be during the holiday rush.
22+
23+
## Race Condition
24+
25+
A race condition happens when two or more actions occur at the same time, and the system’s outcome depends on the order in which they finish. In web applications, this often happens when multiple users or automated requests simultaneously access or modify shared resources, such as inventory or account balances. If proper synchronisation isn’t in place, this can lead to unexpected results, such as duplicate transactions, oversold items, or unauthorised data changes.
26+
27+
![](race.png){: width="1080" height="1080"}
28+
29+
## Types of Race Conditions
30+
31+
Generally, race condition attacks can be divided into three categories:
32+
33+
- **Time-of-Check to Time-of-Use (TOCTOU)**: A TOCTOU race condition happens when a program checks something first and uses it later, but the data changes in between. This means what was true at the time of the check might no longer be true when the action happens. It’s like checking if a toy is in stock, and by the time you click **"Buy"** someone else has already bought it. For example, two users buy the same "last item" at the same time because the stock was checked before it was updated.
34+
35+
- **Shared resource**: This occurs when multiple users or systems try to change the same data simultaneously without proper control. Since both updates happen together, the final result depends on which one finishes last, creating confusion. Think of two cashiers updating the same inventory spreadsheet at once, and one overwrites the other’s work.
36+
37+
- **Atomicity violation**: An atomic operation should happen all at once, either fully done or not at all. When parts of a process run separately, another request can sneak in between and cause inconsistent results. It’s like paying for an item, but before the system confirms it, someone else changes the price. For example, a payment is recorded, but the order confirmation fails because another request interrupts the process.
38+
39+
## Time for Some Action
40+
41+
Now that we understand the basic concepts, let's take the example of the TBFC shopping cart app and exploit the race condition.
42+
43+
## Configuring the Environment
44+
45+
First, we will configure Firefox to route traffic through Burp Suite. On the AttackBox, open `Firefox`, click the `FoxyProxy` icon (1) and select the `Burp` profile (2) so all browser requests are sent to Burp, as shown below:
46+
47+
![](foxy.png){: width="1358" height="504"}
48+
49+
Next, click on the Burp Suite icon on the `Desktop` to launch the application.
50+
51+
![](dock.png){: width="1036" height="311"}
52+
53+
You will see an introductory screen; choose `Temporary project in memory` and click` Next`.
54+
55+
![](temp.png){: width="735" height="489"}
56+
57+
On the configuration screen, click Start Burp to start the application.
58+
59+
![](default.png){: width="740" height="492"}
60+
61+
Once the application is started, you will see the following screen, where we will use the `Proxy` and `Repeater` option to exploit the race condition.
62+
63+
![](dash.png){: width="1363x494" height="494"}
64+
65+
Before proceeding, ensure that you turn off "`Intercept`" in Burp Suite. Open the `Proxy` tab and check the `Intercept` sub-tab; If the button says **"Intercept on"**, click it so it changes to **"Intercept off"**. This step ensures that Burp Suite no longer holds your browser requests and allows them to pass through normally.
66+
67+
![](intercept.png){: width="969" height="378"}
68+
69+
## Making a Legitimate Request
70+
71+
Now that the environment is configured, make a normal request. Open `Firefox`, visit the webapp at `http://MACHINE_IP`, and you will see the following login page:
72+
73+
![](login.png){: width="499" height="318"}
74+
75+
On the site’s login panel, enter the credentials, **username:** `attacker` and **password:** `attacker@123`. After logging in, you’ll arrive at the main dashboard, which shows the limited-edition SleighToy with only 10 units available.
76+
77+
![](checkout1.png){: width="1142" height="275"}
78+
79+
To make a legitimate purchase, click `Add to Cart` for the SleighToy and then click `Checkout` to go to the checkout page.
80+
81+
![](checkout2.png){: width="1131" height="289"}
82+
83+
On the checkout page, click `Confirm & Pay` to complete the purchase. You should see a success message confirming the order, as shown below:
84+
85+
![](payment.png){: width="1165" height="428"}
86+
87+
## Exploiting the Race Condition
88+
89+
Now that we have made a legitimate request, navigate back to Burp Suite and click on `Proxy > HTTP history` and find the **POST** request to the `/process_checkout` endpoint created by our legitimate checkout request. Right-click that entry and choose `Send to Repeater`, which will copy the exact HTTP request (headers, cookies, body) into Burp’s Repeater tool as shown below:
90+
91+
![](repeater.png){: width="1366" height="443"}
92+
93+
Next, switch to the `Repeater` tab and confirm the request appears there, right-click on the first tab, select `Add tab to group`, and click on `Create tab group`.
94+
95+
![](group.png){: width="685" height="558"}
96+
97+
Enter a name for the tab group, such as `cart`, and click **Create**, which will create a tab group named `cart`.
98+
99+
![](create.png){: width="303" height="322"}
100+
101+
Then, right-click the request tab and select `Duplicate tab`. When prompted, enter the number of copies you want (for example, 15). You’ll now have that many identical request tabs inside the cart group.
102+
103+
![](duplicate.png){: width="506x456" height="456"}
104+
105+
Next, use the Repeater toolbar `Send` dropdown menu and select `Send group in parallel (last-byte sync)`, which launches all copies at once and waits for the final byte from each response, maximising the timing overlap to trigger race conditions.
106+
107+
![](sendgroup.png){: width="511" height="514"}
108+
109+
Once this is done, click `Send group (parallel)`; this will launch all 15 requests to the server simultaneously. The server will attempt to handle them simultaneously, which will cause the timing bug to appear (due to multiple orders being processed at once).
110+
111+
![](sendgroup_parallel.png){: width="520" height="464"}
112+
113+
Finally, visit the web app, and you will see multiple confirmed orders and the SleighToy stock reduced (possibly going negative).
114+
115+
![](flag.png){: width="1141" height="372"}
116+
117+
## Mitigation
118+
119+
The attacker logged in and made a normal purchase of the limited SleighToy. Using Burp Suite, he captured the checkout request and sent it multiple times in parallel. Because the app didn’t handle simultaneous checkouts correctly, each request succeeded before the stock could update. This allowed the attacker to buy more toys than available, resulting in a race condition and pushing the stock into negative values. Here are a few mitigation measures to avoid the vulnerability:
120+
121+
- Use **atomic database transactions** so stock deduction and order creation execute as a single, consistent operation.
122+
- Perform a **final stock validation** right before committing the transaction to prevent overselling.
123+
- Implement **idempotency keys** for checkout requests to ensure duplicates aren’t processed multiple times.
124+
- Apply **rate limiting** or concurrency controls to block rapid, repeated checkout attempts from the same user or session.
125+
126+
## Walkthrough
127+
128+
**Flag 1**
129+
130+
Login using the provided credentials:
131+
132+
- **Username:** attacker
133+
- **Password:** attacker@123
134+
135+
**Add Item to Cart**
136+
137+
1. Add an item to the cart
138+
2. Navigate to: `/checkout_page`
139+
140+
**Intercept Checkout Request**
141+
142+
1. Open **Burp Suite**
143+
2. Enable **Intercept**
144+
3. Click **Confirm and Pay**
145+
4. Capture the request
146+
147+
```console
148+
POST /process_checkout HTTP/1.1
149+
Host: 10.49.133.185
150+
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
151+
Accept: */*
152+
Accept-Language: en-US,en;q=0.5
153+
Accept-Encoding: gzip, deflate, br
154+
Referer: http://10.49.133.185/checkout_page
155+
Content-Type: multipart/form-data; boundary=----geckoformboundary7dad42312b25aa062ab34d11967ead66
156+
Content-Length: 59
157+
Origin: http://10.49.133.185
158+
Connection: keep-alive
159+
```
160+
161+
**Trigger the Race Condition**
162+
163+
1. Create a new group in repeater tab
164+
2. Right clib on group tab > Duplicate (50 times)
165+
3. Select Send group in parallel
166+
4. Choose Last-byte sync
167+
5. Send all requests
168+
6. To retrieve second flag, repeat the same steps for the second product.
169+
6 The flag appears once stock becomes negative
170+
171+
## Answer
172+
173+
### Question 1
174+
175+
What is the flag value once the stocks are negative for **SleighToy Limited Edition**?
176+
177+
<details>
178+
<summary style="cursor:pointer; padding:10px; border:1px solid #888; background-color:#444; color:#fff; user-select: none;">
179+
Answer
180+
</summary>
181+
<div style="padding:10px; border:1px solid #888; background-color:#333; color:#fff;">
182+
<span onclick="navigator.clipboard.writeText('THM{WINNER_OF_R@CE007}')" style="cursor:pointer;">THM{WINNER_OF_R@CE007}</span>
183+
<i onclick="navigator.clipboard.writeText('THM{WINNER_OF_R@CE007}')" style="float:right; cursor:pointer; font-size:16px;">&#x1F4C4;</i>
184+
</div>
185+
</details>
186+
187+
### Question 2
188+
189+
Repeat the same steps as were done for ordering the SleighToy Limited Edition. What is the flag value once the stocks are negative for **Bunny Plush (Blue)**?
190+
191+
<details>
192+
<summary style="cursor:pointer; padding:10px; border:1px solid #888; background-color:#444; color:#fff; user-select: none;">
193+
Answer
194+
</summary>
195+
<div style="padding:10px; border:1px solid #888; background-color:#333; color:#fff;">
196+
<span onclick="navigator.clipboard.writeText('THM{WINNER_OF_Bunny_R@ce}')" style="cursor:pointer;">THM{WINNER_OF_Bunny_R@ce}</span>
197+
<i onclick="navigator.clipboard.writeText('THM{WINNER_OF_Bunny_R@ce}')" style="float:right; cursor:pointer; font-size:16px;">&#x1F4C4;</i>
198+
</div>
199+
</details>
82.9 KB
Loading
27.1 KB
Loading
30.9 KB
Loading
10.6 KB
Loading
71.3 KB
Loading
27 KB
Loading
41 KB
Loading
50.6 KB
Loading
30.2 KB
Loading

0 commit comments

Comments
 (0)