.. | ||
css | ||
img | ||
script | ||
1.php | ||
2.php | ||
3.php | ||
4.php | ||
5.php | ||
authenticateLevel.php | ||
final.php | ||
flags.php | ||
index.php | ||
README.md | ||
secretDataBase.db |
Break The Gate (1-5)
Description
Different for each challenge
Deployment
Place on server, write-protect secret-database.db
Difficulty
Easy
Solution
Per challenge, after a succesful login a cookie with the flag will apear.
- Login details are as comment in the html
- Login details are in a JavaScript dictionary calles
userDb
. In console you can print this variable, or you can openscript/ssdb.js
. - An sql-injection will get you in. Example:
" OR 1=1;
as password - As there are only 1000 possible combination, brute-force should go pretty fast. You can write a simple Pythin-program that sends request to [challenge-url]/4.php?try=[0->999] and compare results. (Correct code was 732)
- The login details were send over http, meaning they were in plain text in the pcap file (open the pcap file and check the last packet)
Flag
- IGCTF{ThatWasNotSoHard}
- IGCTF{StopHackingMySitePrettyPlease}
- IGCTF{AllHailOurLordAndSaviourPHP}
- IGCTF{I_may_have_made_this_challenge_last_night}
- IGCTF{KgonnaGoToSleepnow_Bye}