feat: added KnightCTF 2024
|
@ -0,0 +1,25 @@
|
|||
# Gain Access 1
|
||||
> The web challenges are very much similar to real life application bugs. This is going to be a series of Gain Access with 3 challenges unlocks upon solving one by one. By solving these challenges, you'll gain a practical knowledge of Authentication Bypass Vulnerabilites as well as business logic error. The only difference is you'll not get any bounty but you'll get flags. Give it a try. And keep in mind, Don't make it hard, keep it simple. All the best. Solve the challenges & be a cyber knight.
|
||||
|
||||
## About the Challenge
|
||||
We got a website without the source code, and there are 2 functions here. First, we can login using an email and password
|
||||
|
||||
![preview 1](images/preview-1.png)
|
||||
|
||||
And then there's another function where we can reset a user password using an email
|
||||
|
||||
![preview 2](images/preview-2.png)
|
||||
|
||||
## How to Solve?
|
||||
The login feature is vulnerable to SQL injection, to bypass the login page we need to input this username and password:
|
||||
|
||||
```
|
||||
U: ' or true-- -
|
||||
P: test
|
||||
```
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
KCTF{ACc0uNT_tAk3Over}
|
||||
```
|
After Width: | Height: | Size: 52 KiB |
After Width: | Height: | Size: 63 KiB |
After Width: | Height: | Size: 58 KiB |
|
@ -0,0 +1,29 @@
|
|||
# Kitty
|
||||
> Tetanus is a serious, potentially life-threatening infection that can be transmitted by an animal bite.
|
||||
|
||||
## About the Challenge
|
||||
We got a website without the source code, and on this website it looks like we need to bypass the login page
|
||||
|
||||
![preview](images/preview.png)
|
||||
|
||||
## How to Solve?
|
||||
The login page is vulnerable to SQL injection, to bypass the login page we need to input this username and password:
|
||||
|
||||
```
|
||||
U: admin" or true-- -
|
||||
P: test
|
||||
```
|
||||
|
||||
![bypass](images/bypass.png)
|
||||
|
||||
And then inside the dashboard, there is another form where we can execute OS command
|
||||
|
||||
![form](images/form.png)
|
||||
|
||||
To obtain the flag, input `cat flag.txt`
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
KCTF{Fram3S_n3vE9_L1e_4_toGEtH3R}
|
||||
```
|
After Width: | Height: | Size: 194 KiB |
After Width: | Height: | Size: 38 KiB |
After Width: | Height: | Size: 18 KiB |
After Width: | Height: | Size: 269 KiB |
|
@ -0,0 +1,10 @@
|
|||
# KnightCTF 2024
|
||||
CTF writeup for KnightCTF 2024. I took part in this CTF competition with the HCS team and secured the 1st place out of 727 teams
|
||||
|
||||
| Category | Challenge |
|
||||
| --- | --- |
|
||||
| Web | [README](/2024/KnightCTF%202024/README/)
|
||||
| Web | [Kitty](/2024/KnightCTF%202024/Kitty/)
|
||||
| Web | [Gain Access 1](/2024/KnightCTF%202024/Gain%20Access%201/)
|
||||
|
||||
> I just created a writeup for web challenges
|
|
@ -0,0 +1,22 @@
|
|||
# README
|
||||
> Read me if you can!!
|
||||
|
||||
## About the Challenge
|
||||
We got a website without the source code, and on this website, we need to read the `flag.txt` file to obtain the flag.
|
||||
|
||||
![preview 1](images/preview.png)
|
||||
|
||||
In this case, we can't directly read the `flag.txt` file. Instead, we can only read the `text.txt` file.
|
||||
|
||||
![preview 2](images/preview-2.png)
|
||||
|
||||
![preview 3](images/preview-3.png)
|
||||
|
||||
## How to Solve?
|
||||
At first, I thought we need to read the flag using a Path Traversal vulnerability. However, in order to access the flag, we must first bypass the 403 restriction by adding an HTTP proxy header
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
KCTF{kud05w3lld0n3!}
|
||||
```
|
After Width: | Height: | Size: 146 KiB |
After Width: | Height: | Size: 39 KiB |
After Width: | Height: | Size: 30 KiB |
After Width: | Height: | Size: 53 KiB |