picoCTF - Web Exploitation - Search sourceAuthor published on 2022-04-06 included in picoctf webWeb Exploitation - Search Source - writeup description The developer of this website mistakenly left an important artifact in the website source, can you find it? The website is here writeup I was not able to find anything interesting on the website by just looking at the source code in the browser. So let’s clone the website first using HTTrack so we can take a look at the full source.
picoCTF - Web Exploitation - Power CookieAuthor published on 2022-04-06 included in picoctf webWeb Exploitation - Power Cookie - writeup description Can you get the flag? Go to this website and see what you can discover. writeup Looking at the check.php function I can see that it requests a cookie ‘isAdmin’. That cookie is not present at the first visit of the page. So lets refresh the webpage. Now the cookie is present. The value of this particuluar cookie is ‘0’ currently. So lets change it to ‘1’ and refresh the page once more.
picoCTF - Web Exploitation - Local AuthorityAuthor published on 2022-04-06 included in picoctf webWeb Exploitation - Local Authority - writeup description Can you get the flag? Go to this website and see what you can discover. writeup Once I open the link http://saturn.picoctf.net:51419/ in firefox I get to a page “Secure Customer Portal”. I can see a login form with username and password. On the website I see a hint: Only letters and numbers allowed for username and password. I tried to do a simple post request to the login.
picoCTF - Web Exploitation - Inspect HTMLAuthor published on 2022-04-06 included in picoctf webWeb Exploitation - Includes - writeup description Can you get the flag? Go to this website and see what you can discover. writeup Once I opened the website http://saturn.picoctf.net:60935/ in firefox and looking at the source code I could immediately find the flag inside a comment in the html source code: 1 <!--picoCTF{1n5p3t0r_0f_h7ml_ab1df88d}--> So the flag is: 1 picoCTF{1n5p3t0r_0f_h7ml_ab1df88d}
picoCTF - Web Exploitation - IncludesAuthor published on 2022-04-06 included in picoctf webWeb Exploitation - Includes - writeup description Can you get the flag? Go to this website and see what you can discover. writeup Ok so I went ahead and visited the url http://saturn.picoctf.net:52811/ in firefox. I am presente with a webpage with a bunch of text and a button that says “Say hello”. Once I press that button I get a javascript alert() popup that says “This code is in a separate file!
picoCTF - Reverse Engineering - unpackme.pyAuthor published on 2022-04-06 included in reverse engineering picoctfReverse Engineering - unpackme.py - writeup description Can you get the flag? Reverse engineer this Python program. writeup Let’s download the python program first. 1 wget https://artifacts.picoctf.net/c/470/unpackme.flag.py I will try to reverse engineer this python code … If we take a look at the code: 1 2 3 4 5 6 7 8 9 10 11 import base64 from cryptography.fernet import Fernet payload = b'gAAAAABiMD1Ju5_eZeZy7C03K_YcWGDGXfvy5A9b5HzV-uZIYN8syTFGHgLwoRonYtCS0WcDrufxRRXlvNKtyEMqMS0AADLcRNr6VYpLLbKaETF37L22GEg1ok8NutHXK6gy47sBLmxmWWU729b86rzK6IMc2Kg-CR0bMm_fzrbRrWEYSk0WRNnKxy7Juuy-Ss2RjbACKgbwL7HNGATu3hYuPflf3PCKztLRFXCBxijKncKZgt68wYhGnPAzYvUVrdhhtMg9ra7ZKIirltPfKC8iX2DqmR9vVA==' key_str = 'correctstaplecorrectstaplecorrec' key_base64 = base64.