Not Giving-Up : Hacking Netherlands Government

I get rewarded “Dutch Government T-Shirt” for my contribution to their security infrastructure. I’ll explain all the technical part and non-technical parts of it. But before that, I want to tell you why am I proud of it or why the title of this post is “NOT GIVING-UP”.

Why so much Proud?

  1. This is my small aim in 2022 to hack into any government, so I chose the Netherlands government (cuz they offer this cool T-Shirt), but I was even not able to make it in 2023, and finally made it possible in Feb-2024.

  2. I reported around 11 reports to the Netherlands government and 10 of them closed. So it became very challenging.

ncsc

What was my Mindset?

This continues, So in December 2023, when I recovered from my mental health issues(lacking interest & motivation in everything) and came back to hacking, I decided again to hack on the Netherlands government through manual hacking only.

I restarted in January 2024 and sent 5 reports to them which included critical issues, like Account Takeover, SSRF, XSS ..etc I was pretty much shocked when they said N/A in every report, but at last, I reported SSRF and it got accepted.

What was my initial Approach?

well, come back to the topic.

1 — At first, I was going like other hackers i..e just to pick up any one asset from the GitHub scope list and start hacking on it.

2 — When I was not getting results, I started the shortcut method i..e picked up assets that had already been tested before, So I went through all the medium articles where others told their stories of “Hacking into the Dutch Government” and picked up assets from their. Still not getting accepted.

3 — When I came back to December 2023, I was focused on manual hacking, so that time I was focused more on account takeovers and authentication-based attacks, and luckily found an Account Takeover via CSRF attack in one of their servers, which they closed as N/A, I don’t know why ??

4 — Then, I created a nuclei template to find and filters the subdomains which includes login/signup features. I tested about 3–4 web-application but nothing interesting was found. Most of them are restricted.

id: LOGIN-SIGNUP

info:
  name: Login/Signup Detection
  author: Prakhar0x01
  severity: info
  classification:
    cpe: cpe:2.3:a:application:application:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 4
    vendor: application
    product: application
    category: cms
  tags: tech,login,signup,forms

http:
  - method: GET
    path:
      - ""

    redirects: false
    max-redirects: 0
    stop-at-first-match: true

    matchers-condition: or
    matchers:
      - type: word
        words:
          - 'Login'
          - 'login'
          - 'Sign In'
          - 'Sign Up'
          - 'Register'
          - 'login-form'
          - 'signup-form'
          - 'register-form'
          - 'signin'
          - 'signup'
          - 'create account'
          - 'create_account'
          - 'createaccount'
          - 'Create Account'
          - 'Create_Account'
        condition: or

How I found SSRF (Server Side Request Forgery)

ssrf

Conclusion

Yes, hacking becoming hard nowadays cuz there is so much competition globally from various other great hackers and developers aren’t fools like before. But at the same time, you’ll get more attack surfaces like APIs, and Mob. application, IOS ..etc

“Sometimes you don’t need to be very smart or very hard-working, all you need is just not to Give Up”.

Timeline