RISEC CTF + UMass CTF 2022

Note : A JOURNEY TO GAIN KNOWLEDGE

Web Challenge

RISEC CTF

Pretty Horrible Program 1

  <?php
  if (isset($_GET['bingus'])) {
    $input = $_GET['bingus'];
    $to_replace = 'bingus';
    $clean_string = preg_replace("/$to_replace/", '', $input);
    echo "<p>Your string is: $clean_string</p>";
    if ($clean_string == $to_replace) {
      echo "<h2 class=\"answer\">Bingus <span style=\"color: green;\">IS</span> your beloved</h2>";
      output_flag();
    } else {
      echo "<h2 class=\"answer\">Bingus <span style=\"color: red;\">IS NOT</span> your beloved</h2>";
    }
  }
  ?>
  • Notice that $clean_string genererated by replacing

  • So that we just input something that after replacing. it's equal to 'bingus'

demo:

Pretty Horrible Program 2

Pretty Horrible Program 3

Workflow:

  • At first, i just try to find around the key work "SHA256 collision" but we got this one , it takes about β‰ˆ3.6Γ—1013 years to find, so that it's not a practical option.

  • After that i focused on '==' in php. Searching around and i got this and this

  • Now you just put [] in input and get flag.

UMass CTF

venting

This challenge ended and the website was turned off. So i build it in docker from here

  • when you connectn try to see history in burpsuite, you can get the link redirect to the login page

  • Now read the hint with 'admin' in user and password does't have fillter so that mean that may be SQLI. Exactly. that's is blind SQLI

  • I solve this challenge by burpsuite as same as this lab

otherway, try to bruteforce by python request:

Thanks for reading. Have a good day ❀️ !

Contact:

Last updated