Blitzstorm CTF 2024 | Web OFFICIAL Write-Up
2024-2-2 12:18:38 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Hanzala Ghayas Abbasi

InfoSec Write-ups

Blitztorm

Challenge Name : Tindog.

Description : The developer knows how to code, but he doesn’t know about security.

Author : Hanzala.

Points: 100.

When we start our instance, we can see a static page about dogs.

Tindog_Page

Inspecting the page reveals a comment.

Code

We can see some research about dogs from the research.html file.

research.html

Using Wappalyzer, we can identify that the technology being used is PHP.

Wappalyzer

Applying a PHP filter will provide us with base64-encoded PHP code.

flag.php

Decoding the base64-encoded string will reveal the flag.

Challenge Name : Cyber-Awareness.

Description : This person is Trying to raise awareness, but they are unaware that someone may be observing their action.

Author : Hanzala.

Points : 100.

After starting the instance, we encounter a cyber awareness page with nothing interesting in the code.

Cyber_Awarness

Doing directory busting reveal .git folder.

.git

We install all .git folders on our local machine.

download

As depicted in the image below, a folder is installed; your port may vary.

The status command indicates that the flag has been deleted.

git_status

Using the git checkout -- command will reveal the flag.

git_checkout

Finally we will get the flag.

flag

Challenge Name : Discover.

Description : Developer thinks that this is the safest app in the world. Can you prove him wrong?

Author : Hanzala.

Point : 200

In this challenge, you must identify which command is in the allowlist. Below, we observe that \n bypasses the validation, allowing us to retrieve the content in our directory.

Now, we have located the flag in the root directory, as shown in the image below.

Both the flag and .txt are included in the blocklist characters. Therefore, we utilize [] to bypass blocklist characters and ${IFS} to bypass spaces, enabling us to retrieve the flag.

We are done great job everyone! 👏


文章来源: https://infosecwriteups.com/blitzstorm-ctf-2024-web-official-write-up-862452b4444d?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh