Skip to content

Latest commit

 

History

History
54 lines (35 loc) · 1.72 KB

File metadata and controls

54 lines (35 loc) · 1.72 KB

findme

Challenge information

Level: Medium
Tags: picoCTF 2023, Web Exploitation
Author: GEOFFREY NJOGU

Description:
Help us test the form by submiting the username as test and password as test!

The website running here.

Hints:
1. any redirections?

Challenge link: https://play.picoctf.org/practice/challenge/349

Solution

Browse to the web site but before you login start DevTools in your browser (press F12) and navigate to the Network tab as the hint wants us to look for redirections. In the Network tab make sure you have the Preserve Log option enabled.

Then login with test:test!.

You will indeed see a number of redirections. HTTP status codes in the 3xx range are redirections.

Redirections when logging in

One of the id parameters ends with two equal signs so they are both probably base64 encoded. The '=' is padding in base64.

Let's try to decode it to verify

┌──(kali㉿kali)-[/picoCTF/picoCTF_2023/Web_Explotation/findme]
└─$ echo "cGljb0NURntwcm94aWVzX2Fs" | base64 -d
picoCTF{proxies_al  

Combine the parameters and you have the flag.

For additional information, please see the references below.

References