Owen had created an authentication system which lets users login with their email-id or their team name. But that’s not fun is it? Logging in as the admin beats it all, so there’s your challenge.
The portal is running at 128.199.224.175:23000
Note: Use your Pragyan CTF credentials to login to the web portal.
login.php
homepage.php
We can see in login.php that we need to login as admin and with the team_name mode: if($id === 'admin' && $id_type === 'team_name'), but we don't have the password and we can't bypass it.
So let's login with our team credentials:
So now examining login.php we can read the following code:
Now we have a valid session created on server side thanks to $_SESSION['logged_in'] = true; and we are then redirected to homepage.php.
We can see our homepage like this:
Now let's use Burp Suite to replay the modified login request to match the required conditions to get the flag:
We still have our nj8pe045eg0sr6r2ef4r5ch0r6 valid session but the last POST sent to the server has set $id === 'admin'.
Now we have just to refresh homepage.php and grab the flag: pctf{4u1h3ntic4Ti0n.4nd~4u1horiz4ti0n_diff3r}.
Tony had created a QR code for a specific purpose, and sent to his friend Rhody for deployment but when deployed, the QR code wasn’t working as it was supposed to. Figure out what’s wrong and help fix the problem.
If we take a look at the QR code structure, we can see that the positioning squares are undersized and that the alignment square is not completly closed.