Information#
Version#
By | Version | Comment |
---|---|---|
noraj | 1.0 | Creation |
CTF#
- Name : IceCTF 2016
- Website : https://icec.tf/
- Type : Online
- Format : Jeopardy
- CTF Time : link
Description#
What a cheat, I was promised a flag and I can't even log in. Can you get in for me? flagstorage.vuln.icec.tf. They seem to hash their passwords, but I think the problem is somehow related to this.
Solution#
- Look at the source code:
- Script will send our password hashed on the network instead of plain text.
- Login with random credentials.
- Open your browser network analyser and see the POST params:
username
andpassword_plain
that you filled +password
containinge3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
. e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
is the SHA256 hash of the null string according to this or if you try with https://crackstation.net/.- Description of the challenge tell us it's an SQLi so may be we need to inject username and let password_plain null so our hashed password will correspond to the hash we found.
- Try a classic username:
' OR 1=1 #
and null password instead of random password. - We get the flag:
IceCTF{why_would_you_even_do_anything_client_side}
.