‍☠️picoCTF Web Exploitation: Local Authority
本文描述了一个Web Exploitation CTF挑战的解决过程,包括访问登录页面、输入假凭证以触发后台请求,并通过观察和工具分析来发现隐藏的信息。 2025-9-26 05:14:17 Author: infosecwriteups.com(查看原文) 阅读量:10 收藏

Deepika B

In this Web Exploitation CTF challenge, we’re given a basic website that seems simple — but hides the solution in plain sight. Let’s walk through how to solve it step by step, using basic web tools and observation skills.

✅ Step 1: Access the CTF Web Portal

The first thing I did was visit the challenge link. It opened a simple login page that asked for a username and password.

At first glance, it looked like a standard login — nothing suspicious, no errors, no clues in the source code.

Press enter or click to view image in full size

🔑 Step 2: Enter Dummy Credentials

I entered some dummy credentials to test how the page behaves:

Username: dee
Password: 123

Press enter or click to view image in full size

Then, I clicked the Login button.

This didn’t give me access, but it did trigger a request in the background — something that can be useful.


文章来源: https://infosecwriteups.com/%EF%B8%8Fpicoctf-web-exploitation-local-authority-d49a33062f79?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh