Published
- 9 min read
TamilCTF 2021 Web Challenges Writeups
TamilCTF 2021 Web Challenges Writeups
hello everybody iam abdelhameed ghazy and this is my writeup for web challenges in tamilctf 2021
First Challenge : CringeNcoder (scripting)
Des : flag is located at flag, but its not flag
when you enter the challenge we will find this : as you see from the challenge name and this page we noticed it’s an encoder so let’s try it as you see when i enter “a” i got some word and when i entered “ab” i got these two words then i go to /flag to see what’s on it it’s clear now we had an encoded flag and an encoder and they allowed us to use only lowercase chars and numbers we could made it manually but i prefered to auomate the process so i made this script : the flaw of my script is taking every encoded word and try to get the encoded value for every chars and numbers we will use if the encoded value equal to the cipher add the char to the flag first i imported python requests library then i declared a string variable called flag to store flag on it then stored all need chars and numbers in varibale called alpha and the cipher in variable called cipher then i looping in the cipher and take every word and stored it in var called g then i for looped in alpha and then looping in the first loop to send post request to encode every char and then check if the encoded value in cipher equal to the encoded value in the request if equal just add the char to the flag and got this result
Second Challenge : it’s paid (e-shop logic bug & leaked creds)
Des : I heard that admin leaked something somewhere o.O
as we see it's a online courses platform nothing intersted in the home page so i navigated to the courses page
when you enter any course you will find this page
i tried sqli in reddem code parameter to bypass it or to dump data but i couldn't
so i tried to buy the course and intercept the request
as you see at the request the bug here is the price sent from client-side so let's try to manuplate it maybe it's not validated in server-side so i made the prize 0 to made it free
and Alhamdullah as you see it's working !!!
when i entered every course i noticed that every course had 2 seconds video told us it will be available next batch i keep doing this until i found a 10 seconds video so i started this video and found admin panel,creds as a plain text in the url !!!
so i navigated into the panel and logged in by the creds and i found this
then i noticed that i had cookie called special person had false value
so i made it true and got the flag Hamdullah
Third Challenge : Open Flag (ssti & upload from terminal)
as you see there is a login panel i tried sqli on it but nothing interested so i tried to register manually and intercept the request to play with it as you see there my username reflected on the source as a html comment so and because it's a post request i will let the xss to the end and also from webapplizer we will know the server uses flask so i tried ssti (server side template injection ) so i tried {{7*7}} to check and alhamdullah it's working so i opened this repo to get ssti payloads (https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server Side Template Injection) then i used this payload and it's working also Hamdullah as you see in the same page source the flag is in flag.jpg so i used (which curl) command to make sure that the curl is installed in the system then i used transfer.sh site to upload the photo and this is the flag Hamdullah !Fourth Challenge : Recovery (OTP breach leads to bypass)
des: Help PJ pls, he is a memory loss patient who forgot his password Try your hacking skills to help him
as you see the home page had 2 tabs
when we enter Solve The Challenge we will found login page
no bypass,no sqli so i cameback and entered Help PJ
and i found a reset password form contains mail and lastpassword and capatcha i found last password in html comment :
after i filled the form i found an otp enter so i asked the admin if there is any bruteforcing and he told me no bruteforcing
so as usual i tried sqli and searching for any leaked data
and also there is no response manuplation or host header injection so let's cameback and trace the request of resetting password after i intercept the request i found the otp breached at response header for the reset request
so i submitted it and site redirected me to this page
after i veiewd the sourcecode i found i hidden tag with a cookie name and value so i set it and after that i cameback to solve the challenge and i found the form had no action and there is a comment told us that "/login" is missing here so when i entered /login i found the flag in the source
Fifth Challenge : News Letter (sqli leads to bypass login , xxe )
des:TamilCTF plans to send news updates to their participants, a web developer from their team creates a Web App for that. You have been informed to steal the flag from their Web App.
there is a login form with header told us to breah the auth so i used
' or 1=1 limit 1 #
and i bypassed it hamdullah then it redirected me to signup form for newsletter i tried sqli also xD (always trying it in every place i feel it’s dealing with db ) it’s not vulnerable to sqli so i filled the form and found that the email reflected in the page told is that’s exist before so i tried random emails and response is static just the email changes after viewing the source i found that the form sends by xml request in xml form so i intercepted the request and found this after that i opened this repo : https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XXE%20Injection and tried xxe and it worked so i treid to read /etc/passwd file after that i read the source of the php files but no flag also but after viewing the html source i found this html comment:
so i tried to read “/etc/flag” and found the flag Hamdullah 3>
Sixth Challenge : Meeting (mix of things xD)
des:Gokul is trying to cheat in this test, Help him
as we see maybe it's a video meetings paltform
i tried to get sqli or to bypass meetcode parameter but it's not vulnerable to it so i trying to get a new meeting code but it's sending get request to the same page so i tried to send post request and i get a base64 encoded meeting code
after i decoded it and enter the meeting i found that i cannot send anything to the meeting chat and also i logged in as (jopraveen) user and as we know from challenege description we need to be Gokul to help him cheating xD
so i see the cookies to see how it's set our user and i found cookie called user that controls this
so i changed it to Gokul and now we are logged in with his account
as you can see we could send in the meeting chat
so i tried xss and ssti but there is no thing interested
so i viewed the source code and found this html comment :
so i put my beeceptor link and recieved a request
and while i see the request headers i see this
yeah , it's admin cookie so i set it and found magic word appeared but i didn't know how to use it
so i watch the meeting video and found that the exam is in /form
so i opened it and filled it with the magic word and got the flag and also first blood Alhamdullah 3>
Seventh Challenge : become admin (host header injection )
Des : I heard you’re a hacker can you become admin of this site ?
they provide creds of admin and told you that db was removed due to cyber attack so let's try to login with the creds
no thing here but i noticed that the path we are in is /account/login
so i tried /account/register and it's worikng ;)
i registered by the creds like the title said and resirected to the dashboard
but once i clicked on get the flag it was a trick kicked us out :/
and we are now in this page
it said that the admin automate his password resetting so let's try to reset password and intercept the request
nothing breached so i tried host header injection attack
as you see i edited the host header with my beeceptor and recieved the token Hamdullah 3>
after i navigated to the token i could change the password of admin now
after i send the request i found the flag in the response header