RISEC CTF + UMass CTF 2022
Note : A JOURNEY TO GAIN KNOWLEDGE
Web Challenge
RISEC CTF
Pretty Horrible Program 1
<?php
if (isset($_GET['bingus'])) {
$input = $_GET['bingus'];
$to_replace = 'bingus';
$clean_string = preg_replace("/$to_replace/", '', $input);
echo "<p>Your string is: $clean_string</p>";
if ($clean_string == $to_replace) {
echo "<h2 class=\"answer\">Bingus <span style=\"color: green;\">IS</span> your beloved</h2>";
output_flag();
} else {
echo "<h2 class=\"answer\">Bingus <span style=\"color: red;\">IS NOT</span> your beloved</h2>";
}
}
?>Notice that $clean_string genererated by replacing
So that we just input something that after replacing. it's equal to 'bingus'
demo:


Pretty Horrible Program 2
Pretty Horrible Program 3
Workflow:
At first, i just try to find around the key work "SHA256 collision" but we got this one , it takes about β3.6Γ1013 years to find, so that it's not a practical option.
Now you just put [] in input and get flag.
UMass CTF
venting
This challenge ended and the website was turned off. So i build it in docker from here
when you connectn try to see history in burpsuite, you can get the link redirect to the login page
Now read the hint with 'admin' in user and password does't have fillter so that mean that may be SQLI. Exactly. that's is blind SQLI
I solve this challenge by burpsuite as same as this lab
otherway, try to bruteforce by python request:
Thanks for reading. Have a good day β€οΈ !
Contact:
Last updated
