Web Exploitation
Insp3ct0r [50 pts]
Description
Kishor Balan tipped us off that the following code may need inspection:
https://jupiter.challenges.picoctf.org/problem/41511/
(link) or http://jupiter.challenges.picoctf.org:41511
Solution
As the title suggests towards using the Inspect element. I decided to save the whole page and search through it locally. It gives 3 files css.css [useless], mycss.css, myjs.js, and then of course a file for the HTML page. Looking through each file, in the comments was the flag.
Flag: picoCTF{tru3_d3t3ct1ve_0r_ju5t_lucky?832b0699}
where are the robots [100 pts]
Description
Can you find the robots?
https://jupiter.challenges.picoctf.org/problem/36474/
(link) or http://jupiter.challenges.picoctf.org:36474
Solution
The robots file is a trivial common-known file that displays what web crawlers are looking at when indexing a website. So going to this URL revealed the file/path to go-to for the flag.https://jupiter.challenges.picoctf.org/problem/36474/robots.txt
Flag: picoCTF{ca1cu1at1ng_Mach1n3s_477ce}
logon [100 pts]
Description
The factory is hiding things from all of its users. Can you login as Joe and find what they've been looking at?
https://jupiter.challenges.picoctf.org/problem/13594/
(link) or http://jupiter.challenges.picoctf.org:13594
Solution
At first, we are given a username and password form. Of course, I tried admin, admin and that logged in to the no flag screen. I then logged out and did a which also logged in. I realized that the form was not the challenge it was other parts of the message. I sent a fake form and found an interesting variable when requesting the /flag page.
Admin existed and was set to false. Turning that true revealed the flag.
Flag: picoCTF{th3_c0nsp1r4cy_l1v3s_d1c24fef}
dont-use-client-side [100 pts] [Not Solved]
Description
Can you break into this super secure portal?
https://jupiter.challenges.picoctf.org/problem/37821/
(link) or http://jupiter.challenges.picoctf.org:37821
Solution
a
Flag:
picobrowser [200 pts] [Not Solved]
Description
This website can be rendered only by picobrowser, go and catch the flag!
https://jupiter.challenges.picoctf.org/problem/26704/
(link) or http://jupiter.challenges.picoctf.org:26704
Solution
a
Flag:
Client-side-again [200 pts] [Not Solved]
Description
Can you break into this super secure portal?
https://jupiter.challenges.picoctf.org/problem/56816/
(link) or http://jupiter.challenges.picoctf.org:56816
Solution
a
Flag:
Irish-Name-Repo 1 [300 pts] [Not Solved]
Description
There is a website running at
https://jupiter.challenges.picoctf.org/problem/33850/
(link) or http://jupiter.challenges.picoctf.org:33850. Do you think you can log us in? Try to see if you can login!
Solution
a
Flag:
Irish-Name-Repo 2 [350 pts] [Not Solved]
Description
There is a website running at
https://jupiter.challenges.picoctf.org/problem/64649/
(link). Someone has bypassed the login before, and now it's being strengthened. Try to see if you can still login! or http://jupiter.challenges.picoctf.org:64649
Solution
a
Flag:
Irish-Name-Repo 3 [400 pts] [Not Solved]
Description
There is a secure website running at
https://jupiter.challenges.picoctf.org/problem/54253/
(link) or http://jupiter.challenges.picoctf.org:54253. Try to see if you can login as admin!
Solution
a
Flag:
JaWT Scratchpad [400 pts] [Not Solved]
Description
Check the admin scratchpad!
https://jupiter.challenges.picoctf.org/problem/63090/
or http://jupiter.challenges.picoctf.org:63090
Solution
a
Flag:
Java Script Kiddie [400 pts] [Not Solved]
Description
The image link appears broken... https://jupiter.challenges.picoctf.org/problem/58112 or http://jupiter.challenges.picoctf.org:58112
Solution
a
Flag:
Java Script Kiddie 2 [450 pts] [Not Solved]
Description
The image link appears broken... twice as badly... https://jupiter.challenges.picoctf.org/problem/42899 or http://jupiter.challenges.picoctf.org:42899
Solution
a
Flag:
Last updated