write-ups-challenges-2019-2020/Padlock
2022-11-24 22:43:03 +01:00
..
assets initial commit 2022-11-24 22:43:03 +01:00
CSS initial commit 2022-11-24 22:43:03 +01:00
script initial commit 2022-11-24 22:43:03 +01:00
.gitkeep initial commit 2022-11-24 22:43:03 +01:00
bamboozle.php initial commit 2022-11-24 22:43:03 +01:00
docker.sh initial commit 2022-11-24 22:43:03 +01:00
Dockerfile initial commit 2022-11-24 22:43:03 +01:00
index.php initial commit 2022-11-24 22:43:03 +01:00
README.md initial commit 2022-11-24 22:43:03 +01:00
robots.txt initial commit 2022-11-24 22:43:03 +01:00
success.php initial commit 2022-11-24 22:43:03 +01:00
writeup.md initial commit 2022-11-24 22:43:03 +01:00

CHALLENGE padlock

Simple web-hacking challenge

Description

Crack the code and find the flag.

Flag

IG{w31C0mE_7O_tH3_m47R1x}

How the challenge works

It takes a simple 3-digit code (solution: 329) to be able to view success.php. Code's are submitted via POST-request with variable name try, a simple brute-force script will do the trick. However: the site has a few easter-eggs; some will also redirect you to another page (without a flag).