gpnCTF 2023 Web Writeup
Β·
🚩 CTF/2023
[ Wanky mail ] 더보기 from flask import Flask, render_template_string, request, redirect, abort from aiosmtpd.controller import Controller from datetime import datetime from base58 import b58decode, b58encode import random import string import os from datetime import datetime import queue mails = {} active_addr = queue.Queue(1000) def format_email(sender, rcpt, body, timestamp, subject): return {"s..
[ justCTF2023 ] Aquatic_delights
Β·
🚩 CTF/2023
./challenge/ β”œβ”€β”€ challenge β”‚ β”œβ”€β”€ app.py β”‚ β”œβ”€β”€ poc.py β”‚ β”œβ”€β”€ poc.sh β”‚ β”œβ”€β”€ static β”‚ └── templates β”‚ └── index.html β”œβ”€β”€ docker-compose.yml └── Dockerfile version: '3' services: shop: build: . container_name: aquatic_delights ports: - "8080:8080" environment: - FLAG=justCTF{here_should_be_a_flag} restart: always You can see flag in docker-compose.yml. There are only few codes to check out. Let's see ..
[ justCTF 2023 ] eXtra-Safe-Security-layers
Β·
🚩 CTF/2023
This Chall is well-known type of XSS Challenge. ./web_extra-safe-security-layers/ β”œβ”€β”€ docker-compose.yml β”œβ”€β”€ Dockerfile └── src β”œβ”€β”€ app.js β”œβ”€β”€ bot.js β”œβ”€β”€ flag.txt β”œβ”€β”€ package.json β”œβ”€β”€ public β”‚ β”œβ”€β”€ admin_background.png β”‚ └── background.png └── templates └── index.ejs It gives that this chall has 5 safety layer through remark. These remarks confused me, even if this chall was not that hard. Just I..
BuckeyeCTF 2022
Β·
🚩 CTF/Former Doc
● buckeyenotes The word "=" is filtered. Bypass it. Payload : ' or username like 'brutusB3stNut9999' and password like '%a%'-- Flag : buckeye{wr1t3_ur_0wn_0p3n_2_pwn} ● pong I can't find any flag in this service. I guessed if I win this game, I can get a flag. There are no given source code. So I just looked up devtools, then I could find below code. const socket = io(); const canvas = document...
P4CTF 2022
Β·
🚩 CTF/Former Doc
● Cvg3n3rat0r This is the main page. If I write down some words and click the submit, you can download a file. The result file is like this. I don't have much ideas, so I simply tried some code in there. There is nothing in result file. In this case, I can assume two situations. First, the service has word filtering. Second, the service recognized script tag and apply it in appropriate way. I th..
TsuckuCTF 2022
Β·
🚩 CTF/Former Doc
● Bug Hunter I can get a hint in main page. It gives a word "Reflected XSS". So I tried some test payload using "tsukushi" parameter. I can trigger XSS. But where is the flag? I can't guess anything, so checked description. They gave me "guess" and "RFC". I searched about RFC and find hint like this. I entered into "/.well-kown/security.txt". Got it. Technically, it's not xss problem I expected...
WreckCTF 2022
Β·
🚩 CTF/Former Doc
It's shame that I can't solve all challenge in web section. I must study harder. ● web/sources You can check flag in DevTools, Flag flag{bd6a9e3f1690f7abb8445c0e} ● password-1 When you enter into "/api/outout" endpoint, can check the flag Flag flag{why_is_hashing_in_browser_so_hard} ● password-2 payload : 1' or 1=1-- Flag flag{i_love_in_memory_sqlite} ● web/notes1 const add = (note) => { const i..
CCE 2022 Review
Β·
🚩 CTF/Former Doc
λ³΄ν˜Έλ˜μ–΄ μžˆλŠ” κΈ€μž…λ‹ˆλ‹€.
BalsnCTF 2022
Β·
🚩 CTF/Former Doc
This service related to next.js. // globalVars.js const globalVars = { TITLE: "My First App!", SECRET: "here is my secret: https://www.youtube.com/watch?v=jIQ6UV2onyI", FLAG: "FLAGFLAGFLAG", }; export default globalVars; I can see fake flag and SECRET with link. I entered it, but no important information in there. Let's look around more. import Head from 'next/head' import Image from 'next/image..